Description
The package simple-git before 3.3.0 are vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options it was possible to get arbitrary command execution.
Remediation
References
https://github.com/steveukx/git-js/pull/767
https://github.com/steveukx/git-js/releases/tag/simple-git%403.3.0
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245
https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199
Related Vulnerabilities
CVE-2020-11975 Vulnerability in maven package org.apache.unomi:unomi-common
CVE-2011-2093 Vulnerability in maven package com.adobe.blazeds:blazeds-core
CVE-2011-3376 Vulnerability in maven package org.apache.tomcat:tomcat-catalina
CVE-2022-35915 Vulnerability in maven package org.webjars.npm:openzeppelin__contracts