Lucene search

K
cve[email protected]CVE-2023-26134
HistoryJun 28, 2023 - 5:15 a.m.

CVE-2023-26134

2023-06-2805:15:10
CWE-78
CWE-77
web.nvd.nist.gov
18
cve-2023-26134
git-commit-info
command injection
vulnerability
security
nvd

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.8%

Versions of the package git-commit-info before 2.0.2 are vulnerable to Command Injection such that the package-exported method gitCommitInfo () fails to sanitize its parameter commit, which later flows into a sensitive command execution API. As a result, attackers may inject malicious commands once they control the hash content.

Affected configurations

NVD
Node
git-commit-info_projectgit-commit-infoRange<2.0.2node.js

CNA Affected

[
  {
    "product": "git-commit-info",
    "versions": [
      {
        "version": "0",
        "lessThan": "2.0.2",
        "status": "affected",
        "versionType": "semver"
      }
    ],
    "vendor": "n/a"
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

54.8%

Related for CVE-2023-26134