Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2022-25648
Description:The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
Test IDs: 1.3.6.1.4.1.25623.1.0.820675   1.3.6.1.4.1.25623.1.0.820693   1.3.6.1.4.1.25623.1.0.820680   1.3.6.1.4.1.25623.1.1.10.2022.0248  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2022-25648
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q2V3HOFU4ZVTQZHAVAVL3EX2KU53SP7R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWNJA7WPE67LJ3DJMWZ2TADHCZKWMY55/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTJUF6SFPL4ZVSJQHGQ36KFPFO5DQVYZ/
https://github.com/ruby-git/ruby-git/pull/569
https://github.com/ruby-git/ruby-git/pull/569
https://github.com/ruby-git/ruby-git/releases/tag/v1.11.0
https://github.com/ruby-git/ruby-git/releases/tag/v1.11.0
https://snyk.io/vuln/SNYK-RUBY-GIT-2421270
https://snyk.io/vuln/SNYK-RUBY-GIT-2421270
https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html




© 1998-2025 E-Soft Inc. All rights reserved.