CVE-2022-25648

HIGH

Git < 1.11.0 - Command Injection

Title source: rule
STIX 2.1

Description

The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.

Scores

CVSS v3 8.1
EPSS 0.0429
EPSS Percentile 88.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-88
Status published
Products (7)
debian/debian_linux 10.0
fedoraproject/extra_packages_for_enterprise_linux 8.0
fedoraproject/fedora 34
fedoraproject/fedora 35
fedoraproject/fedora 36
git/git < 1.11.0
rubygems/git 0 - 1.11.0RubyGems
Published Apr 19, 2022
Tracked Since Feb 18, 2026