Lucene search

K
githubGitHub Advisory DatabaseGHSA-6F9P-G466-F8V8
HistorySep 19, 2023 - 6:30 a.m.

blamer vulnerable to Arbitrary Argument Injection via the blameByFile() API

2023-09-1906:30:17
CWE-88
GitHub Advisory Database
github.com
5
arbitrary argument injection
api
vulnerable
user input
command-line flags
git binary

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

EPSS

0.001

Percentile

30.1%

Versions of the package blamer before 1.0.4 are vulnerable to Arbitrary Argument Injection via the blameByFile() API. The library does not sanitize for user input or validate the given file path conforms to a specific schema, nor does it properly pass command-line flags to the git binary using the double-dash POSIX characters (–) to communicate the end of options.

Affected configurations

Vulners
Node
blamer_projectblamerRange<1.0.4node.js
VendorProductVersionCPE
blamer_projectblamer*cpe:2.3:a:blamer_project:blamer:*:*:*:*:*:node.js:*:*

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

EPSS

0.001

Percentile

30.1%