Lucene search

K
mageiaGentoo FoundationMGASA-2023-0001
HistoryJan 13, 2023 - 8:37 p.m.

Updated python-gitpython packages fix security vulnerability

2023-01-1320:37:09
Gentoo Foundation
advisories.mageia.org
45
python
gitpython
security vulnerability
remote code execution
user input
validation
remote url
clone command
exploiting
library
external calls
git
sanitization
input arguments
ext transport protocol
cve-2022-24439
unix

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.011 Low

EPSS

Percentile

84.2%

Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments. This is only relevant when enabling the ext transport protocol (CVE-2022-24439)

OSVersionArchitecturePackageVersionFilename
Mageia8noarchpython-gitpython< 3.1.30-1python-gitpython-3.1.30-1.mga8

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.011 Low

EPSS

Percentile

84.2%