The package workspace-tools before 0.18.4 are vulnerable to Command Injection via git argument injection. When calling the fetchRemoteBranch(remote: string, remoteBranch: string, cwd: string) function, both the remote and remoteBranch parameters are passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
References
Link | Resource |
---|---|
https://github.com/microsoft/workspace-tools/pull/103 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-WORKSPACETOOLS-2421201 | Exploit Third Party Advisory |
https://github.com/microsoft/workspace-tools/commit/9bc7e65ce497f87e1f363fd47b8f802f3d3cd978 | Patch Third Party Advisory |
Configurations
Information
Published : 2022-05-13 13:15
Updated : 2022-05-24 09:17
NVD link : CVE-2022-25865
Mitre link : CVE-2022-25865
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
microsoft
- workspace-tools