Description
The package simple-git before 3.15.0 are vulnerable to Remote Code Execution (RCE) when enabling the ext transport protocol, which makes it exploitable via clone() method. This vulnerability exists due to an incomplete fix of [CVE-2022-24066](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306).
Remediation
References
https://github.com/steveukx/git-js/blob/main/docs/PLUGIN-UNSAFE-ACTIONS.md%23overriding-allowed-protocols
https://github.com/steveukx/git-js/commit/774648049eb3e628379e292ea172dccaba610504
https://github.com/steveukx/git-js/releases/tag/simple-git%403.15.0
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3153532
https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221
Related Vulnerabilities
CVE-2023-47320 Vulnerability in maven package org.silverpeas.core:silverpeas-core-web
CVE-2020-6950 Vulnerability in maven package org.glassfish:jakarta.faces
CVE-2022-23496 Vulnerability in maven package nl.basjes.parse.useragent:yauaa-drill
CVE-2022-25979 Vulnerability in maven package org.webjars.npm:jsuites