Skip to content

Commit 6f85e5b

Browse files
1 parent 1472f98 commit 6f85e5b

File tree

2 files changed

+7
-3
lines changed

2 files changed

+7
-3
lines changed

advisories/github-reviewed/2025/12/GHSA-fw33-qpx7-rhx2/GHSA-fw33-qpx7-rhx2.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fw33-qpx7-rhx2",
4-
"modified": "2025-12-12T15:59:13Z",
4+
"modified": "2025-12-18T00:59:38Z",
55
"published": "2025-12-11T16:48:48Z",
66
"aliases": [
77
"CVE-2025-67508"
88
],
99
"summary": "gardenctl is vulnerable to Command Injection when used with non‑POSIX shells",
10-
"details": "A security vulnerability was discovered for [gardenctl](https://github.com/gardener/gardenctl-v2) when it is used with non‑POSIX shells such as **[Fish](https://fishshell.com/)** and **[PowerShell](https://learn.microsoft.com/en-us/powershell/)**. Such setup could allow an attacker with administrative privileges for a Gardener project to craft malicious credential values in infrastructure Secret objects that break out of the intended string context when evaluated in Fish or PowerShell environments used by the Gardener service operators, leading to arbitrary command execution on the operator's device.\n\n**Am I vulnerable?**\nThis CVE affects all Gardener operators who use **gardenctl < v2.12.0** with non‑POSIX shells such as **[Fish](https://fishshell.com/)** and **[PowerShell](https://learn.microsoft.com/en-us/powershell/)**.",
10+
"details": "A security vulnerability was discovered in [gardenctl](https://github.com/gardener/gardenctl-v2) when it is used with non‑POSIX shells such as **[Fish](https://fishshell.com/)** and **[PowerShell](https://learn.microsoft.com/en-us/powershell/)**. Such setup could allow an attacker with administrative privileges for a Gardener project to craft malicious credential values in infrastructure Secret objects that break out of the intended string context when evaluated in Fish or PowerShell environments used by the Gardener service operators, leading to arbitrary command execution on the operator's device.\n\n**Am I vulnerable?**\nThis CVE affects all Gardener operators who use **gardenctl < v2.12.0** with non‑POSIX shells such as **[Fish](https://fishshell.com/)** and **[PowerShell](https://learn.microsoft.com/en-us/powershell/)**.",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",

advisories/github-reviewed/2025/12/GHSA-mq8m-42gh-wq7r/GHSA-mq8m-42gh-wq7r.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-mq8m-42gh-wq7r",
4-
"modified": "2025-12-11T22:02:18Z",
4+
"modified": "2025-12-18T01:00:21Z",
55
"published": "2025-12-10T15:31:24Z",
66
"aliases": [
77
"CVE-2025-8110"
@@ -40,6 +40,10 @@
4040
"type": "ADVISORY",
4141
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8110"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://github.com/advisories/GHSA-mq8m-42gh-wq7r"
46+
},
4347
{
4448
"type": "PACKAGE",
4549
"url": "https://github.com/gogs/gogs"

0 commit comments

Comments
 (0)