The package cookiecutter before 2.1.1 are vulnerable to Command Injection via hg argument injection. When calling the cookiecutter function from Python code with the checkout parameter, it is passed to the hg checkout command in a way that additional flags can be set. The additional flags can be used to perform a command injection.
References
Link | Resource |
---|---|
https://snyk.io/vuln/SNYK-PYTHON-COOKIECUTTER-2414281 | Exploit Patch Third Party Advisory |
https://github.com/cookiecutter/cookiecutter/commit/fdffddb31fd2b46344dfa317531ff155e7999f77 | Patch Third Party Advisory |
https://github.com/cookiecutter/cookiecutter/releases/tag/2.1.1 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5TXC4JYTNGOUFMCXPZ6QKWEZN3URTAK/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWT7SGFDCUPPLDIELTN7FVTHWDL5YK/ | Mailing List Third Party Advisory |
Information
Published : 2022-06-08 01:15
Updated : 2023-01-19 12:10
NVD link : CVE-2022-24065
Mitre link : CVE-2022-24065
JSON object : View
CWE
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Products Affected
cookiecutter_project
- cookiecutter
fedoraproject
- fedora