CVE-2022-1440
moderate-risk
Published 2022-04-22
Command Injection vulnerability in git-interface@2.1.1 in GitHub repository yarkeev/git-interface prior to 2.1.2. If both are provided by user input, then the use of a `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would then allow for any operating system command to be spawned by the attacker.
Do I need to act?
~
9.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: f828aa790016fee3aa667f7b44cf94bf0aa8c60d, f828aa790016fee3aa667f7b44cf94bf0aa8c60d
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Git-Interface
Affected Vendors
References (4)
48
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
11/34 · Low
Exposure
5/34 · Minimal