Command Injection in git-tags-remote
High severity
GitHub Reviewed
Published
Jul 29, 2020
to the GitHub Advisory Database
•
Updated Jan 9, 2023
Description
Reviewed
Jul 29, 2020
Published to the GitHub Advisory Database
Jul 29, 2020
Last updated
Jan 9, 2023
All versions of
git-tags-remote
are vulnerable to Command Injection. The package fails to sanitize the repository input and passes it directly to anexec
call on theget
function . This may allow attackers to execute arbitrary code in the system if therepo
value passed to the function is user-controlled.The following proof-of-concept creates a file in
/tmp
:References