The package ungit before 1.5.20 are vulnerable to Remote Code Execution (RCE) via argument injection. The issue occurs when calling the /api/fetch endpoint. User controlled values (remote and ref) are passed to the git fetch command. By injecting some git options it was possible to get arbitrary command execution.
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
Link | Tags |
---|---|
https://snyk.io/vuln/SNYK-JS-UNGIT-2414099 | third party advisory release notes |
https://github.com/FredrikNoren/ungit/pull/1510 | exploit third party advisory patch |
https://github.com/FredrikNoren/ungit/blob/master/CHANGELOG.md%231520 | release notes third party advisory broken link |