Sourcegraph is a code intelligence platform. In versions prior to 4.1.0 a command Injection vulnerability existed in the gitserver service, present in all Sourcegraph deployments. This vulnerability was caused by a lack of input validation on the host parameter of the `/list-gitolite` endpoint. It was possible to send a crafted request to gitserver that would execute commands inside the container. Successful exploitation requires the ability to send local requests to gitserver. The issue is patched in version 4.1.0.
References
| Link | Resource |
|---|---|
| https://github.com/sourcegraph/sourcegraph/pull/42553 | Patch Third Party Advisory |
| https://github.com/sourcegraph/sourcegraph/security/advisories/GHSA-pfm3-23mh-6xjp | Third Party Advisory |
| https://github.com/sourcegraph/sourcegraph/pull/42553 | Patch Third Party Advisory |
| https://github.com/sourcegraph/sourcegraph/security/advisories/GHSA-pfm3-23mh-6xjp | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:24
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/sourcegraph/sourcegraph/pull/42553 - Patch, Third Party Advisory | |
| References | () https://github.com/sourcegraph/sourcegraph/security/advisories/GHSA-pfm3-23mh-6xjp - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.9 |
Information
Published : 2022-11-22 19:15
Updated : 2024-11-21 07:24
NVD link : CVE-2022-41942
Mitre link : CVE-2022-41942
CVE.ORG link : CVE-2022-41942
JSON object : View
Products Affected
sourcegraph
- sourcegraph
