Description
The package simple-git before 3.3.0 are vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options it was possible to get arbitrary command execution.
Remediation
References
https://github.com/steveukx/git-js/pull/767
https://github.com/steveukx/git-js/releases/tag/simple-git%403.3.0
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245
https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199
Related Vulnerabilities
CVE-2021-21290 Vulnerability in maven package io.netty:netty-codec-http
CVE-2023-30528 Vulnerability in maven package org.jenkins-ci.plugins:wso2id-oauth
CVE-2020-26289 Vulnerability in maven package org.webjars.npm:date-and-time
CVE-2021-21341 Vulnerability in maven package com.thoughtworks.xstream:xstream