Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization.
This vulnerability exists due to an incomplete fix of [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221).
References
Link | Resource |
---|---|
https://github.com/steveukx/git-js/commit/ec97a39ab60b89e870c5170121cd9c1603cc1951 | Patch Third Party Advisory |
https://github.com/steveukx/git-js/pull/881/commits/95459310e5b8f96e20bb77ef1a6559036b779e13 | Patch Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3177391 | Exploit Third Party Advisory |
https://github.com/steveukx/git-js/commit/ec97a39ab60b89e870c5170121cd9c1603cc1951 | Patch Third Party Advisory |
https://github.com/steveukx/git-js/pull/881/commits/95459310e5b8f96e20bb77ef1a6559036b779e13 | Patch Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3177391 | Exploit Third Party Advisory |
Configurations
History
01 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-78 |
Information
Published : 2023-01-26 21:15
Updated : 2025-04-01 16:15
NVD link : CVE-2022-25860
Mitre link : CVE-2022-25860
CVE.ORG link : CVE-2022-25860
JSON object : View
Products Affected
simple-git_project
- simple-git
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
NVD-CWE-noinfo CWE-78Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')