Description
The package ungit before 1.5.20 are vulnerable to Remote Code Execution (RCE) via argument injection. The issue occurs when calling the /api/fetch endpoint. User controlled values (remote and ref) are passed to the git fetch command. By injecting some git options it was possible to get arbitrary command execution.
Remediation
References
https://github.com/FredrikNoren/ungit/pull/1510
https://snyk.io/vuln/SNYK-JS-UNGIT-2414099
https://github.com/FredrikNoren/ungit/blob/master/CHANGELOG.md%231520
Related Vulnerabilities
CVE-2023-41886 Vulnerability in maven package org.openrefine:database
CVE-2023-27495 Vulnerability in npm package @fastify/csrf-protection
CVE-2016-10735 Vulnerability in maven package com.loopeer.android:bootstrap
CVE-2019-12409 Vulnerability in maven package org.apache.solr:solr-core
CVE-2015-5347 Vulnerability in maven package org.apache.wicket:wicket-extensions