OS Command Injection vulnerability in bbultman gitsome through 0.2.3 allows attackers to execute arbitrary commands via a crafted tag name of the target git repository.
References
| Link | Resource |
|---|---|
| https://advisory.checkmarx.net/advisory/CX-2021-4780 | Exploit Third Party Advisory |
| https://www.npmjs.com/package/gitsome | Product Third Party Advisory |
| https://advisory.checkmarx.net/advisory/CX-2021-4780 | Exploit Third Party Advisory |
| https://www.npmjs.com/package/gitsome | Product Third Party Advisory |
Configurations
History
21 Nov 2024, 06:09
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://advisory.checkmarx.net/advisory/CX-2021-4780 - Exploit, Third Party Advisory | |
| References | () https://www.npmjs.com/package/gitsome - Product, Third Party Advisory |
Information
Published : 2022-06-02 14:15
Updated : 2024-11-21 06:09
NVD link : CVE-2021-34081
Mitre link : CVE-2021-34081
CVE.ORG link : CVE-2021-34081
JSON object : View
Products Affected
gitsome_project
- gitsome
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
