HIGH · 8.1

CVE-2022-24439

All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone...

Vulnerability Description

All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.

CVSS Score

8.1

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
Gitpython ProjectGitpython< 3.1.30
FedoraprojectFedora36
DebianDebian Linux10.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-24439?

CVE-2022-24439 is a vulnerability with a CVSS score of 8.1 (HIGH). All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone...

How severe is CVE-2022-24439?

CVE-2022-24439 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-24439?

Check the references section above for vendor advisories and patch information. Affected products include: Gitpython Project Gitpython, Fedoraproject Fedora, Debian Debian Linux.