Description
The package ungit before 1.5.20 are vulnerable to Remote Code Execution (RCE) via argument injection. The issue occurs when calling the /api/fetch endpoint. User controlled values (remote and ref) are passed to the git fetch command. By injecting some git options it was possible to get arbitrary command execution.
Remediation
References
https://github.com/FredrikNoren/ungit/blob/master/CHANGELOG.md%231520
https://github.com/FredrikNoren/ungit/pull/1510
https://snyk.io/vuln/SNYK-JS-UNGIT-2414099
Related Vulnerabilities
CVE-2019-10295 Vulnerability in maven package org.jenkins-ci.plugins:crittercism-dsym
CVE-2018-3721 Vulnerability in maven package org.webjars.bowergithub.lodash:lodash
CVE-2022-41401 Vulnerability in maven package org.openrefine:main
CVE-2023-36472 Vulnerability in npm package @strapi/utils
CVE-2022-24377 Vulnerability in npm package cycle-import-check