First published: Tue Nov 22 2022(Updated: )
Sourcegraph is a code intelligence platform. In versions prior to 4.1.0 a command Injection vulnerability existed in the gitserver service, present in all Sourcegraph deployments. This vulnerability was caused by a lack of input validation on the host parameter of the `/list-gitolite` endpoint. It was possible to send a crafted request to gitserver that would execute commands inside the container. Successful exploitation requires the ability to send local requests to gitserver. The issue is patched in version 4.1.0.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sourcegraph Sourcegraph | <4.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41942 is a command Injection vulnerability in the gitserver service of Sourcegraph.
Versions prior to 4.1.0 of Sourcegraph are affected by CVE-2022-41942.
CVE-2022-41942 has a severity rating of 7.8 (High).
To fix CVE-2022-41942, upgrade to version 4.1.0 or later of Sourcegraph.
You can find more information about CVE-2022-41942 on the Sourcegraph GitHub page and the Sourcegraph security advisories page.