Vulnerability Description
The package cocoapods-downloader before 1.6.2 are vulnerable to Command Injection via hg argument injection. When calling the download function (when using hg), the url (and/or revision, tag, branch) is passed to the hg clone command in a way that additional flags can be set. The additional flags can be used to perform a command injection.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cocoapods | Cocoapods-Downloader | < 1.6.2 |
Related Weaknesses (CWE)
References
- https://github.com/CocoaPods/cocoapods-downloader/pull/127PatchThird Party Advisory
- https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414280Third Party Advisory
- https://github.com/CocoaPods/cocoapods-downloader/pull/127PatchThird Party Advisory
- https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414280Third Party Advisory
FAQ
What is CVE-2022-21223?
CVE-2022-21223 is a vulnerability with a CVSS score of 8.1 (HIGH). The package cocoapods-downloader before 1.6.2 are vulnerable to Command Injection via hg argument injection. When calling the download function (when using hg), the url (and/or revision, tag, branch) ...
How severe is CVE-2022-21223?
CVE-2022-21223 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-21223?
Check the references section above for vendor advisories and patch information. Affected products include: Cocoapods Cocoapods-Downloader.