First published: Wed Apr 13 2022(Updated: )
A flaw was found in ruby-git, where the package is vulnerable to command injection via the git argument. This flaw allows an attacker to set additional flags, which leads to performing command injections.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rubygem-git | <0:1.11.0-1.el8 | 0:1.11.0-1.el8 |
Git Git | <1.11.0 | |
Fedoraproject Extra Packages For Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2022-25648.
The severity level of CVE-2022-25648 is critical with a severity value of 9.8.
This vulnerability occurs due to command injection via the git argument injection in the ruby-git package.
The affected software includes versions before 1.11.0 of the ruby-git package, versions before 0:1.11.0-1.el8 of the rubygem-git package, Git Git versions up to 1.11.0, Extra Packages For Enterprise Linux 8.0, Fedora versions 34, 35, and 36, and Debian Debian Linux 10.0.
To fix CVE-2022-25648, update the ruby-git package to version 1.11.0 or later.