Vulnerability CVE-2022-25766


Published: 2022-03-21

Description:
The package ungit before 1.5.20 are vulnerable to Remote Code Execution (RCE) via argument injection. The issue occurs when calling the /api/fetch endpoint. User controlled values (remote and ref) are passed to the git fetch command. By injecting some git options it was possible to get arbitrary command execution.

Type:

CWE-77

(Improper Neutralization of Special Elements used in a Command ('Command Injection'))

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Ungit project -> Ungit 

 References:
https://github.com/FredrikNoren/ungit/pull/1510
https://snyk.io/vuln/SNYK-JS-UNGIT-2414099
https://github.com/FredrikNoren/ungit/blob/master/CHANGELOG.md%231520

Copyright 2024, cxsecurity.com

 

Back to Top