Lucene search

K
nvd[email protected]NVD:CVE-2023-26143
HistorySep 19, 2023 - 5:17 a.m.

CVE-2023-26143

2023-09-1905:17:10
CWE-88
web.nvd.nist.gov
3
package vulnerability
arbitrary argument injection
user input validation
command-line flags
git binary

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

30.1%

Versions of the package blamer before 1.0.4 are vulnerable to Arbitrary Argument Injection via the blameByFile() API. The library does not sanitize for user input or validate the given file path conforms to a specific schema, nor does it properly pass command-line flags to the git binary using the double-dash POSIX characters (–) to communicate the end of options.

Affected configurations

Nvd
Node
blamer_projectblamerRange<1.0.4node.js
VendorProductVersionCPE
blamer_projectblamer*cpe:2.3:a:blamer_project:blamer:*:*:*:*:*:node.js:*:*

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

30.1%