First published: Fri Mar 04 2022(Updated: )
### Impact Weblate didn't correctly sanitize some arguments passed to Git and Mercurial, which allowed changing their behavior in an unintended way. ### Patches The issues were fixed in the 4.11.1 release. The following commits are addressing it: * 35d59f1f040541c358cece0a8d4a63183ca919b8 * d83672a3e7415da1490334e2c9431e5da1966842 ### Workarounds Instances in which untrusted users cannot create new components are not affected. ### References * [SNYK-PYTHON-WEBLATE-2414088](https://security.snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088) ### For more information If you have any questions or comments about this advisory: * Open a topic in [discussions](https://github.com/WeblateOrg/weblate/discussions) * Email us at [care@weblate.org](mailto:care@weblate.org)
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Weblate | <4.11.1 | 4.11.1 |
Weblate | <4.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23915 has been classified with a moderate severity due to improper sanitization of parameters.
To fix CVE-2022-23915, update Weblate to version 4.11.1 or later.
Weblate versions prior to 4.11.1 are affected by CVE-2022-23915.
CVE-2022-23915 is a security vulnerability related to improper input sanitization.
Yes, CVE-2022-23915 could allow attackers to alter the behavior of Git and Mercurial in unintended ways.