Description
The package simple-git before 3.15.0 are vulnerable to Remote Code Execution (RCE) when enabling the ext transport protocol, which makes it exploitable via clone() method. This vulnerability exists due to an incomplete fix of [CVE-2022-24066](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306).
Remediation
References
https://github.com/steveukx/git-js/blob/main/docs/PLUGIN-UNSAFE-ACTIONS.md%23overriding-allowed-protocols
https://github.com/steveukx/git-js/commit/774648049eb3e628379e292ea172dccaba610504
https://github.com/steveukx/git-js/releases/tag/simple-git%403.15.0
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3153532
https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221
Related Vulnerabilities
CVE-2020-8134 Vulnerability in npm package ghost
CVE-2018-11694 Vulnerability in npm package node-sass
CVE-2022-23496 Vulnerability in maven package nl.basjes.parse.useragent:yauaa-beam
CVE-2021-3461 Vulnerability in maven package org.keycloak:keycloak-services
CVE-2022-39387 Vulnerability in maven package org.xwiki.contrib.oidc:oidc-authenticator