First published: Tue Dec 06 2022(Updated: )
All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.
Credit: report@snyk.io report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
pip/GitPython | <=3.1.29 | 3.1.30 |
Gitpython Project Gitpython Python | <3.1.30 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-24439 is critical with a CVSS score of 9.8.
All versions of GitPython up to and including 3.1.29 are affected by CVE-2022-24439.
CVE-2022-24439 enables remote code execution (RCE) by allowing an attacker to inject a malicious remote URL into the clone command.
The recommended remedy for CVE-2022-24439 in GitPython is to update to version 3.1.30.
Yes, you can find references for CVE-2022-24439 at the following links: [link1](https://github.com/gitpython-developers/GitPython/blob/bec61576ae75803bc4e60d8de7a629c194313d1c/git/repo/base.py%23L1249), [link2](https://lists.debian.org/debian-lts-announce/2023/07/msg00024.html), [link3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IKMVYKLWX62UEYKAN64RUZMOIAMZM5JN/).