Command Injection in git-tags-remote
High severity
GitHub Reviewed
Published
Jul 29, 2020
to the GitHub Advisory Database
•
Updated Jan 9, 2023
Description
Reviewed
Jul 29, 2020
Published to the GitHub Advisory Database
Jul 29, 2020
Last updated
Jan 9, 2023
All versions of
git-tags-remoteare vulnerable to Command Injection. The package fails to sanitize the repository input and passes it directly to anexeccall on thegetfunction . This may allow attackers to execute arbitrary code in the system if therepovalue passed to the function is user-controlled.The following proof-of-concept creates a file in
/tmp:References