CVE-2022-21235: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
(updated )
The package github.com/masterminds/vcs before 1.13.3 is vulnerable to Command Injection via argument injection. When hg is executed, argument strings are passed to hg in a way that additional flags can be set. The additional flags can be used to perform a command injection.
References
- github.com/Masterminds/vcs/commit/922a5122330ea8fbe56352a0172ddb6bf019cd22
- github.com/Masterminds/vcs/pull/105
- github.com/Masterminds/vcs/releases/tag/v1.13.2
- github.com/Masterminds/vcs/security/advisories/GHSA-6635-c626-vj4r
- github.com/advisories/GHSA-6635-c626-vj4r
- nvd.nist.gov/vuln/detail/CVE-2022-21235
- snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMASTERMINDSVCS-2437078
Detect and mitigate CVE-2022-21235 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →