GitPython vulnerable to remote code execution due to insufficient sanitization of input arguments
Critical severity
GitHub Reviewed
Published
Aug 11, 2023
to the GitHub Advisory Database
•
Updated Sep 20, 2024
Description
Published by the National Vulnerability Database
Aug 11, 2023
Published to the GitHub Advisory Database
Aug 11, 2023
Reviewed
Aug 11, 2023
Last updated
Sep 20, 2024
GitPython before 3.1.32 does not block insecure non-multi options in
clone
andclone_from
, making it vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments. NOTE: this issue exists because of an incomplete fix for CVE-2022-24439.References