CVE-2022-24439 (High) detected in GitPython-3.1.29-py3-none-any.whl
mend-bolt-for-github opened this issue · 1 comments
CVE-2022-24439 - High Severity Vulnerability
Vulnerable Library - GitPython-3.1.29-py3-none-any.whl
GitPython is a python library used to interact with Git repositories
Library home page: https://files.pythonhosted.org/packages/1f/d3/020efb312a7d25fa00e144497a33378d415552e5581be080a99017af6d39/GitPython-3.1.29-py3-none-any.whl
Path to dependency file: /docs/requirements.txt
Path to vulnerable library: /docs/requirements.txt,/docs/requirements.txt,/tmp/ws-scm/java-patterns
Dependency Hierarchy:
- ❌ GitPython-3.1.29-py3-none-any.whl (Vulnerable Library)
Found in base branch: master
Vulnerability Details
All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.
Publish Date: 2022-12-06
URL: CVE-2022-24439
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Step up your Open Source Security Game with Mend here
👋 Thanks for reporting!