CVE-2022-25766

The package ungit before 1.5.20 are vulnerable to Remote Code Execution (RCE) via argument injection. The issue occurs when calling the /api/fetch endpoint. User controlled values (remote and ref) are passed to the git fetch command. By injecting some git options it was possible to get arbitrary command execution.
References
Link Resource
https://github.com/FredrikNoren/ungit/pull/1510 Exploit Patch Third Party Advisory
https://snyk.io/vuln/SNYK-JS-UNGIT-2414099 Release Notes Third Party Advisory
https://github.com/FredrikNoren/ungit/blob/master/CHANGELOG.md%231520 Broken Link Release Notes Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:ungit_project:ungit:*:*:*:*:*:node.js:*:*

Information

Published : 2022-03-21 11:15

Updated : 2022-03-28 10:45


NVD link : CVE-2022-25766

Mitre link : CVE-2022-25766


JSON object : View

CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

Advertisement

dedicated server usa

Products Affected

ungit_project

  • ungit