Description
The package simple-git before 3.15.0 are vulnerable to Remote Code Execution (RCE) when enabling the ext transport protocol, which makes it exploitable via clone() method. This vulnerability exists due to an incomplete fix of [CVE-2022-24066](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306).
Remediation
References
https://github.com/steveukx/git-js/blob/main/docs/PLUGIN-UNSAFE-ACTIONS.md%23overriding-allowed-protocols
https://github.com/steveukx/git-js/commit/774648049eb3e628379e292ea172dccaba610504
https://github.com/steveukx/git-js/releases/tag/simple-git%403.15.0
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3153532
https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221
Related Vulnerabilities
CVE-2020-24025 Vulnerability in maven package org.webjars.npm:node-sass
CVE-2022-34114 Vulnerability in maven package io.dataease:dataease-plugin-common
CVE-2023-40037 Vulnerability in maven package org.apache.nifi:nifi-hikari-dbcp-service
CVE-2018-1000118 Vulnerability in maven package org.webjars.npm:electron
CVE-2021-21685 Vulnerability in maven package org.jenkins-ci.main:jenkins-core