First published: Wed Dec 07 2022(Updated: )
All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.
Affected Software | Affected Version | How to fix |
---|---|---|
GitPython | <= |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2151583 is critical due to the potential for Remote Code Execution.
To fix REDHAT-BUG-2151583, update to the latest patched version of GitPython.
REDHAT-BUG-2151583 is caused by improper user input validation allowing malicious URLs in the clone command.
All versions of GitPython are affected by REDHAT-BUG-2151583.
Exploiting REDHAT-BUG-2151583 can lead to unauthorized Remote Code Execution on affected systems.