CVE-2022-23915: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Weblate
(updated )
Weblate didn’t correctly sanitize some arguments passed to Git and Mercurial, which allowed changing their behavior in an unintended way.
References
- github.com/WeblateOrg/weblate
- github.com/WeblateOrg/weblate/commit/35d59f1f040541c358cece0a8d4a63183ca919b8
- github.com/WeblateOrg/weblate/commit/d83672a3e7415da1490334e2c9431e5da1966842
- github.com/WeblateOrg/weblate/pull/7337
- github.com/WeblateOrg/weblate/pull/7338
- github.com/WeblateOrg/weblate/releases/tag/weblate-4.11.1
- github.com/WeblateOrg/weblate/security/advisories/GHSA-3872-f48p-pxqj
- github.com/advisories/GHSA-3872-f48p-pxqj
- github.com/pypa/advisory-database/tree/main/vulns/weblate/PYSEC-2022-162.yaml
- github.com/pypa/advisory-database/tree/main/vulns/weblate/PYSEC-2022-31.yaml
- nvd.nist.gov/vuln/detail/CVE-2022-23915
- security.snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088
- snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088
Detect and mitigate CVE-2022-23915 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →