Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:43327
HistorySep 21, 2023 - 6:09 a.m.

Arbitrary Argument Injection

2023-09-2106:09:08
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
3
arbitrary argument injection
blamer
api
vulnerability
git binary
command line

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

0.001 Low

EPSS

Percentile

20.3%

blamer is vulnerable to Arbitrary Argument Injection. The vulnerability is due to blameByFile() API not properly sanitizing the user input and validating the give file path. This can be exploited by the attacker by using he double-dash POSIX character (–) to pass malicious command line arguments to the git binary .

CPENameOperatorVersion
blamerlev1.0.3
blamerlev1.0.3

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

0.001 Low

EPSS

Percentile

20.3%

Related for VERACODE:43327