Skip to content

Commit e8b5d0e

Browse files
committed
1 parent 27a55c2 commit e8b5d0e

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

advisories/github-reviewed/2022/03/GHSA-9gqr-xp86-f87h/GHSA-9gqr-xp86-f87h.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-9gqr-xp86-f87h",
4-
"modified": "2022-03-25T16:13:13Z",
4+
"modified": "2023-01-27T05:00:54Z",
55
"published": "2022-03-18T00:01:11Z",
66
"aliases": [
77
"CVE-2021-23632"
88
],
99
"summary": "Code injection in npm git",
10-
"details": "All versions of package git are vulnerable to Remote Code Execution (RCE) due to missing sanitization in the Git.git method, which allows execution of OS commands rather than just git commands. At this time, there is no known workaround. There has been no patch released.",
10+
"details": "## Advisory: GHSA-q2wx-h5pq-g6hx\n\n### Description\nKnown Security Issues\n\n#### Vulnerability:\n- **Git: Code injection in npm git - GHSA-9gqr-xp86-f87h**\n- **Mime: Regular Expression Denial of Service - GHSA-wrvr-8mpx-r7pp**\n\n### Affected Versions\n- All versions of `mime` before 1.4.1\n\n### Severity\n- **High**\n\n### Steps to Mitigate\n- No fix available. Consider using alternative packages that do not have these vulnerabilities.\n\n### Patched Versions\n- No patched versions available at this time.\n\n### Additional Information\n- Users should review their usage of the affected packages and apply necessary mitigations.\n",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",

0 commit comments

Comments
 (0)