ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-47318.
References
Link | Resource |
---|---|
https://github.com/ruby-git/ruby-git/pull/602 | Patch Third Party Advisory |
https://github.com/ruby-git/ruby-git | Product Third Party Advisory |
https://jvn.jp/en/jp/JVN16765254/index.html | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html | Mailing List Third Party Advisory |
Information
Published : 2023-01-17 02:15
Updated : 2023-02-02 10:45
NVD link : CVE-2022-46648
Mitre link : CVE-2022-46648
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
debian
- debian_linux
ruby-git_project
- ruby-git