CVE-2022-46648: Improper Control of Generation of Code ('Code Injection')
(updated )
ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-47318.
References
- github.com/advisories/GHSA-pfpr-3463-c6jh
- github.com/ruby-git/ruby-git
- github.com/ruby-git/ruby-git/pull/602
- github.com/ruby-git/ruby-git/releases/tag/v1.13.0
- github.com/rubysec/ruby-advisory-db/blob/master/gems/git/CVE-2022-46648.yml
- jvn.jp/en/jp/JVN16765254/index.html
- nvd.nist.gov/vuln/detail/CVE-2022-46648
Detect and mitigate CVE-2022-46648 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →