ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-46648.
References
Link | Resource |
---|---|
https://github.com/ruby-git/ruby-git/pull/602 | Patch Third Party Advisory |
https://github.com/ruby-git/ruby-git | Product Third Party Advisory |
https://jvn.jp/en/jp/JVN16765254/index.html | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KPFLSZPUM7APWVBRM5DCAY5OUVQBF4K/ | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html | Mailing List Third Party Advisory |
Information
Published : 2023-01-17 02:15
Updated : 2023-01-31 11:08
NVD link : CVE-2022-47318
Mitre link : CVE-2022-47318
JSON object : View
CWE
Products Affected
debian
- debian_linux
ruby-git_project
- ruby-git
fedoraproject
- fedora