Skip to main content

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CVE-2022-24437

Severity High
Score 9.8/10

Summary

The package git-pull-or-clone before version 2.0.2 is vulnerable to Command Injection due to the use of the "--upload-pack" feature of git which is also supported for git clone. The source includes the use of the secure child process API "spawn()". However, the "outpath" parameter passed to it may be a command-line argument to the git clone command and result in arbitrary Command Injection.

  • LOW
  • NETWORK
  • HIGH
  • UNCHANGED
  • NONE
  • NONE
  • HIGH
  • HIGH

CWE-77 - Command Injection

A command injection attack involves injecting an operating system command through the data input, which gets executed on the host operating system with the privileges of the victimized application. The impact of a command injection attack may range from loss of data confidentiality and integrity to unauthorized remote access to the hosting system. The attack may cause serious data breaches and system takeover.

Advisory Timeline

  • Published