DEBIAN-CVE-2022-24439

Source
https://security-tracker.debian.org/tracker/CVE-2022-24439
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-24439.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2022-24439
Upstream
Published
2022-12-06T05:15:11Z
Modified
2025-09-25T23:27:18.103829Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.

References

Affected packages

Debian:11 / python-git

Package

Name
python-git
Purl
pkg:deb/debian/python-git?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.14-1+deb11u1

Affected versions

3.*

3.1.14-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / python-git

Package

Name
python-git
Purl
pkg:deb/debian/python-git?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.30-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / python-git

Package

Name
python-git
Purl
pkg:deb/debian/python-git?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.30-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / python-git

Package

Name
python-git
Purl
pkg:deb/debian/python-git?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.30-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}