GMS-2022-19: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
(updated )
GitHub CLI depends on a git.exe executable being found in system %PATH% on Windows. However, if a malicious .\git.exe
or .\git.bat
is found in the current working directory at the time of running gh, the malicious command will be invoked instead of the system one. Windows users who run gh inside untrusted directories are affected.
References
Detect and mitigate GMS-2022-19 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →