GHSA-w4xh-w33p-4v29

Suggest an improvement
Source
https://github.com/advisories/GHSA-w4xh-w33p-4v29
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-w4xh-w33p-4v29/GHSA-w4xh-w33p-4v29.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-w4xh-w33p-4v29
Aliases
Published
2022-05-14T00:55:16Z
Modified
2024-05-20T19:55:20Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
GitHub Git LFS Arbitrary command execution vulnerability
Details

GitHub Git LFS before 2.1.1 allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, located on a url = line in a .lfsconfig file within a repository.

Specific Go Packages Affected

github.com/git-lfs/git-lfs/lfsapi

Database specific
{
    "nvd_published_at": "2017-12-21T06:29:00Z",
    "cwe_ids": [
        "CWE-20"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-02-08T00:28:40Z"
}
References

Affected packages

Go / github.com/git-lfs/git-lfs

Package

Name
github.com/git-lfs/git-lfs
View open source insights on deps.dev
Purl
pkg:golang/github.com/git-lfs/git-lfs

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.1-0.20170519163204-f913f5f9c7c6