Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-24437— Command Injection

CVSS 9.8 · Critical EPSS 10.39% · P93
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-24437

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Command Injection
Source: NVD (National Vulnerability Database)
Vulnerability Description
The package git-pull-or-clone before 2.0.2 are vulnerable to Command Injection due to the use of the --upload-pack feature of git which is also supported for git clone. The source includes the use of the secure child process API spawn(). However, the outpath parameter passed to it may be a command-line argument to the git clone command and result in arbitrary command injection.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
git-pull-or-clone 参数注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
git-pull-or-clone是用于确保磁盘上存在 git 存储库并且它是最新的。 git-pull-or-clone 2.0.2之前版本存在参数注入漏洞,攻击者利用该漏洞可导致任意的命令注入。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-git-pull-or-clone unspecified ~ 2.0.2 -

II. Public POCs for CVE-2022-24437

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-24437

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-05-01 · 24 CVEs total

CVE-2022-257679.8 CRITICALRemote Code Execution
CVE-2022-239238.6 HIGHSandbox Bypass
CVE-2022-256477.7 HIGHDeserialization of Untrusted Data
CVE-2022-253017.7 HIGHPrototype Pollution
CVE-2022-212277.5 HIGHDenial of Service (DoS)
CVE-2022-211677.5 HIGHArbitrary Code Execution
CVE-2022-221437.5 HIGHPrototype Pollution
CVE-2022-211447.5 HIGHDenial of Service (DoS)
CVE-2022-258507.5 HIGHServer-side Request Forgery (SSRF)
CVE-2022-211897.3 HIGHPrototype Pollution
CVE-2022-258426.9 MEDIUMArbitrary File Write via Archive Extraction (Zip Slip)
CVE-2022-256456.5 MEDIUMPrototype Pollution
CVE-2022-260686.5 MEDIUMPath Traversal
CVE-2022-212305.5 MEDIUMInformation Exposure
CVE-2022-211495.4 MEDIUMCross-site Scripting (XSS)
CVE-2022-253495.4 MEDIUMCross-site Scripting (XSS)
CVE-2022-258445.3 MEDIUMRegular Expression Denial of Service (ReDoS)
CVE-2022-29849Progress OpenEdge权限许可和访问控制问题漏洞
CVE-2022-28481CSV-Safe gem 安全漏洞
CVE-2021-31674Cyclos 4 PRO 跨站脚本漏洞

Showing top 20 of 24 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-24437

No comments yet


Leave a comment