icon

We found results for “

WS-2020-0089

Good to know:

icon

Date: May 20, 2020

gitting through 0.0.8 are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an exec call, which may allow attackers to execute arbitrary code in the system. The pull function is vulnerable through the branch variable.

Language: JS

Severity Score

Severity Score

Weakness Type (CWE)

Command Injection

CWE-77

Code

CWE-17

Injection

CWE-74

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us