Git-fastclone passes user modifiable strings directly to a shell command
Critical severity
GitHub Reviewed
Published
Aug 15, 2018
to the GitHub Advisory Database
•
Updated Aug 28, 2023
Description
Published to the GitHub Advisory Database
Aug 15, 2018
Reviewed
Jun 16, 2020
Last updated
Aug 28, 2023
git-fastclone before 1.0.5 passes user modifiable strings directly to a shell command. An attacker can execute malicious commands by modifying the strings that are passed as arguments to
cd
andgit clone
commands in the library.References