Vulnerability Description
In "index.js" file line 240, the run command executes the git command with a user controlled variable called remoteUrl. This affects git-diff-apply all versions prior to 0.22.2.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Git-Diff-Apply Project | Git-Diff-Apply | < 0.22.2 |
Related Weaknesses (CWE)
References
- https://github.com/kellyselden/git-diff-apply/commit/106d61d3ae723b4257c2a13e67bPatchThird Party Advisory
- https://snyk.io/vuln/SNYK-JS-GITDIFFAPPLY-540774%2C
- https://snyk.io/vuln/SNYK-JS-GITDIFFAPPLY-540774ExploitPatchThird Party Advisory
- https://github.com/kellyselden/git-diff-apply/commit/106d61d3ae723b4257c2a13e67bPatchThird Party Advisory
- https://snyk.io/vuln/SNYK-JS-GITDIFFAPPLY-540774%2C
FAQ
What is CVE-2019-10776?
CVE-2019-10776 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In "index.js" file line 240, the run command executes the git command with a user controlled variable called remoteUrl. This affects git-diff-apply all versions prior to 0.22.2.
How severe is CVE-2019-10776?
CVE-2019-10776 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-10776?
Check the references section above for vendor advisories and patch information. Affected products include: Git-Diff-Apply Project Git-Diff-Apply.