ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-46648.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://github.com/ruby-git/ruby-git | third party advisory product |
https://github.com/ruby-git/ruby-git/pull/602 | third party advisory patch |
https://jvn.jp/en/jp/JVN16765254/index.html | third party advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KPFLSZPUM7APWVBRM5DCAY5OUVQBF4K/ | vendor advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html | third party advisory mailing list |