Vulnerability Description
The package workspace-tools before 0.18.4 are vulnerable to Command Injection via git argument injection. When calling the fetchRemoteBranch(remote: string, remoteBranch: string, cwd: string) function, both the remote and remoteBranch parameters are passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Workspace-Tools | < 0.18.4 |
Related Weaknesses (CWE)
References
- https://github.com/microsoft/workspace-tools/commit/9bc7e65ce497f87e1f363fd47b8fPatchThird Party Advisory
- https://github.com/microsoft/workspace-tools/pull/103PatchThird Party Advisory
- https://snyk.io/vuln/SNYK-JS-WORKSPACETOOLS-2421201ExploitThird Party Advisory
- https://github.com/microsoft/workspace-tools/commit/9bc7e65ce497f87e1f363fd47b8fPatchThird Party Advisory
- https://github.com/microsoft/workspace-tools/pull/103PatchThird Party Advisory
- https://snyk.io/vuln/SNYK-JS-WORKSPACETOOLS-2421201ExploitThird Party Advisory
FAQ
What is CVE-2022-25865?
CVE-2022-25865 is a vulnerability with a CVSS score of 8.1 (HIGH). The package workspace-tools before 0.18.4 are vulnerable to Command Injection via git argument injection. When calling the fetchRemoteBranch(remote: string, remoteBranch: string, cwd: string) function...
How severe is CVE-2022-25865?
CVE-2022-25865 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-25865?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Workspace-Tools.