CVE-2022-25648

HIGH

Git < 1.11.0 - Command Injection

Title source: rule

Description

The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.

Scores

CVSS v3 8.1
EPSS 0.0429
EPSS Percentile 88.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-88
Status published

Affected Products (7)

git/git < 1.11.0
fedoraproject/extra_packages_for_enterprise_linux
fedoraproject/fedora
fedoraproject/fedora
fedoraproject/fedora
debian/debian_linux
rubygems/git < 1.11.0RubyGems

Timeline

Published Apr 19, 2022
Tracked Since Feb 18, 2026