The async-git package before 1.13.2 for Node.js allows OS Command Injection via shell metacharacters, as demonstrated by git.reset and git.tag. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. Ensure to sanitize untrusted user input before passing it to one of the vulnerable functions as a workaround or update async-git to version 1.13.1.
advisory.checkmarx.net/advisory/CX-2021-4772
github.com/omrilotan/async-git
github.com/omrilotan/async-git/pull/13
github.com/omrilotan/async-git/pull/13/commits/611823bd97dd41e9e8127c38066868ff9dcfa57a
github.com/omrilotan/async-git/pull/13/commits/a5f45f58941006c4cc1699609383b533d9b92c6a
github.com/omrilotan/async-git/pull/14
nvd.nist.gov/vuln/detail/CVE-2021-3190
www.npmjs.com/package/async-git