CVE-2021-3013: OS command injection in ripgrep
(updated )
ripgrep before 13 on Windows allows attackers to trigger execution of arbitrary programs from the current working directory via the -z/–search-zip or –pre flag.
References
- github.com/BurntSushi/ripgrep
- github.com/BurntSushi/ripgrep/blob/e48a17e1891e1ea9dd06ba0e48d5fb140ca7c0c4/CHANGELOG.md
- github.com/BurntSushi/ripgrep/blob/master/CHANGELOG.md
- github.com/BurntSushi/ripgrep/blob/master/CHANGELOG.md
- github.com/BurntSushi/ripgrep/issues/1773
- github.com/advisories/GHSA-g4xg-fxmg-vcg5
- nvd.nist.gov/vuln/detail/CVE-2021-3013
- rustsec.org/advisories/RUSTSEC-2021-0071.html
Detect and mitigate CVE-2021-3013 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →