ghsa-3872-f48p-pxqj
Vulnerability from github
Published
2022-03-04 21:15
Modified
2024-11-19 18:28
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N
VLAI Severity ?
Summary
Improper Neutralization of Special Elements used in a Command ('Command Injection') in Weblate
Details
Impact
Weblate didn't correctly sanitize some arguments passed to Git and Mercurial, which allowed changing their behavior in an unintended way.
Patches
The issues were fixed in the 4.11.1 release. The following commits are addressing it:
- 35d59f1f040541c358cece0a8d4a63183ca919b8
- d83672a3e7415da1490334e2c9431e5da1966842
Workarounds
Instances in which untrusted users cannot create new components are not affected.
References
For more information
If you have any questions or comments about this advisory: * Open a topic in discussions * Email us at care@weblate.org
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "Weblate" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "4.11.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-23915" ], "database_specific": { "cwe_ids": [ "CWE-77", "CWE-88" ], "github_reviewed": true, "github_reviewed_at": "2022-03-04T21:15:31Z", "nvd_published_at": "2022-03-04T20:15:00Z", "severity": "HIGH" }, "details": "### Impact\nWeblate didn\u0027t correctly sanitize some arguments passed to Git and Mercurial, which allowed changing their behavior in an unintended way.\n\n### Patches\n\nThe issues were fixed in the 4.11.1 release. The following commits are addressing it:\n\n* 35d59f1f040541c358cece0a8d4a63183ca919b8\n* d83672a3e7415da1490334e2c9431e5da1966842\n\n### Workarounds\n\nInstances in which untrusted users cannot create new components are not affected.\n\n### References\n* [SNYK-PYTHON-WEBLATE-2414088](https://security.snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088)\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open a topic in [discussions](https://github.com/WeblateOrg/weblate/discussions)\n* Email us at [care@weblate.org](mailto:care@weblate.org)\n", "id": "GHSA-3872-f48p-pxqj", "modified": "2024-11-19T18:28:54Z", "published": "2022-03-04T21:15:31Z", "references": [ { "type": "WEB", "url": "https://github.com/WeblateOrg/weblate/security/advisories/GHSA-3872-f48p-pxqj" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23915" }, { "type": "WEB", "url": "https://github.com/WeblateOrg/weblate/pull/7337" }, { "type": "WEB", "url": "https://github.com/WeblateOrg/weblate/pull/7338" }, { "type": "WEB", "url": "https://github.com/WeblateOrg/weblate/commit/35d59f1f040541c358cece0a8d4a63183ca919b8" }, { "type": "WEB", "url": "https://github.com/WeblateOrg/weblate/commit/d83672a3e7415da1490334e2c9431e5da1966842" }, { "type": "PACKAGE", "url": "https://github.com/WeblateOrg/weblate" }, { "type": "WEB", "url": "https://github.com/WeblateOrg/weblate/releases/tag/weblate-4.11.1" }, { "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/weblate/PYSEC-2022-162.yaml" }, { "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/weblate/PYSEC-2022-31.yaml" }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N", "type": "CVSS_V4" } ], "summary": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) in Weblate" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…