Description
The package ungit before 1.5.20 are vulnerable to Remote Code Execution (RCE) via argument injection. The issue occurs when calling the /api/fetch endpoint. User controlled values (remote and ref) are passed to the git fetch command. By injecting some git options it was possible to get arbitrary command execution.
Remediation
References
https://github.com/FredrikNoren/ungit/blob/master/CHANGELOG.md%231520
https://github.com/FredrikNoren/ungit/pull/1510
https://snyk.io/vuln/SNYK-JS-UNGIT-2414099
Related Vulnerabilities
CVE-2018-17198 Vulnerability in maven package org.apache.roller:roller-webapp
CVE-2020-1697 Vulnerability in maven package org.keycloak:keycloak-server-spi-private
CVE-2021-3163 Vulnerability in npm package quill
CVE-2020-6451 Vulnerability in maven package org.webjars.npm:electron
CVE-2019-9153 Vulnerability in maven package org.webjars.npm:openpgp