First published: Fri Aug 11 2023(Updated: )
GitPython before 3.1.32 does not block insecure non-multi options in `clone` and `clone_from`, making it vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments. NOTE: this issue exists because of an incomplete fix for CVE-2022-24439.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/GitPython | <3.1.32 | 3.1.32 |
debian/python-git | <=2.1.11-1<=3.1.14-1 | 2.1.11-1+deb10u2 3.1.30-1+deb12u2 3.1.37-3 |
redhat/git-python | <3.1.32 | 3.1.32 |
ubuntu/python-git | <2.1.8-1ubuntu0.1~ | 2.1.8-1ubuntu0.1~ |
ubuntu/python-git | <3.0.7-1ubuntu0.1~ | 3.0.7-1ubuntu0.1~ |
ubuntu/python-git | <3.1.24-1ubuntu0.1~ | 3.1.24-1ubuntu0.1~ |
ubuntu/python-git | <3.1.30-1ubuntu0.23.04.1 | 3.1.30-1ubuntu0.23.04.1 |
ubuntu/python-git | <0.3.2~ | 0.3.2~ |
ubuntu/python-git | <1.0.1+ | 1.0.1+ |
Gitpython Project Gitpython Python | <3.1.32 |
https://github.com/gitpython-developers/GitPython/commit/ca965ecc81853bca7675261729143f54e5bf4cdd
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.