Skip to content

Commit 12ebb6d

Browse files
committed
* This CVE is reserved but not public yet, but the vulnerability has been fixed via a pull request and version 1.13.0 of the git gem has been released. * The only other information I could find on CVE-2022-46648 are: * https://jvn.jp/jp/JVN16765254/index.html * https://www.cybersecurity-help.cz/vdb/SB2023010501 * Note, their vulnerable version range is incorrect. I checked the version tags for ruby-git, and `eval()` was added in 1.2.0. Versions prior to 1.2.0 do not have the `eval()`. ruby-git/ruby-git@ee90922
1 parent 44535e8 commit 12ebb6d

File tree

1 file changed

+24
-0
lines changed

1 file changed

+24
-0
lines changed

gems/git/CVE-2022-46648.yml

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
---
2+
gem: git
3+
cve: 2022-46648
4+
url: https://github.com/ruby-git/ruby-git/pull/602
5+
title: Potential remote code execution in ruby-git
6+
date: 2023-01-05
7+
description: |
8+
The git gem, between versions 1.2.0 and 1.12.0, incorrectly parsed the output
9+
of the 'git ls-files' command using eval() to unescape quoted file names.
10+
If a file name was added to the git repository contained special characters,
11+
such as '\n', then the 'git ls-files' command would print the file name in
12+
quotes and escape any special characters.
13+
If the 'Git#ls_files' method encountered a quoted file name it would use
14+
eval() to unquote and unescape any special characters, leading to potential
15+
remote code execution. Version 1.13.0 of the git gem was released which
16+
correctly parses any quoted file names.
17+
cvss_v3: 5.5
18+
patched_versions:
19+
- '>= 1.13.0'
20+
unaffected_versions:
21+
- '< 1.2.0'
22+
related:
23+
url:
24+
- https://github.com/ruby-git/ruby-git/releases/tag/v1.13.0

0 commit comments

Comments
 (0)