Description
The package simple-git before 3.3.0 are vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options it was possible to get arbitrary command execution.
Remediation
References
https://github.com/steveukx/git-js/pull/767
https://github.com/steveukx/git-js/releases/tag/simple-git%403.3.0
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245
https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199
Related Vulnerabilities
CVE-2018-25007 Vulnerability in maven package com.vaadin:flow-server
CVE-2020-15231 Vulnerability in maven package org.mapfish.print:print-servlet
CVE-2023-36479 Vulnerability in maven package org.eclipse.jetty.ee10:jetty-ee10-servlets
CVE-2023-31890 Vulnerability in maven package com.glazedlists:glazedlists
CVE-2021-23337 Vulnerability in maven package org.webjars.npm:lodash