Vulnerability Description
The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: git.reset('atouch HACKEDb')
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Async-Git Project | Async-Git | < 1.13.2 |
Related Weaknesses (CWE)
References
- https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce9PatchThird Party Advisory
- https://github.com/omrilotan/async-git/pull/14PatchThird Party Advisory
- https://snyk.io/vuln/SNYK-JS-ASYNCGIT-1064877PatchThird Party Advisory
- https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce9PatchThird Party Advisory
- https://github.com/omrilotan/async-git/pull/14PatchThird Party Advisory
- https://snyk.io/vuln/SNYK-JS-ASYNCGIT-1064877PatchThird Party Advisory
FAQ
What is CVE-2020-28490?
CVE-2020-28490 is a vulnerability with a CVSS score of 9.1 (CRITICAL). The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: git.reset('atouch HACKEDb')
How severe is CVE-2020-28490?
CVE-2020-28490 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-28490?
Check the references section above for vendor advisories and patch information. Affected products include: Async-Git Project Async-Git.