5 results (0.003 seconds)

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 0

trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. A vulnerability affected older pods which migrated from the pre-2014 pull request workflow to trunk. If the pods had never been claimed then it was still possible to do so. It was also possible to have all owners removed from a pod, and that made the pod available for the same claiming system. This was patched server-side in commit 71be5440906b6bdfbc0bcc7f8a9fec33367ea0f4 in September 2023. trunk.cocoapods.org es el servidor de autenticación para el administrador de dependencias de CoacoaPods. • https://blog.cocoapods.org/Claim-Your-Pods https://blog.cocoapods.org/CocoaPods-Trunk-RCEs-2023 https://evasec.webflow.io/blog/eva-discovered-supply-chain-vulnerabities-in-cocoapods#1-taking-unauthorized-ownership-over-orphaned-pods https://github.com/CocoaPods/CocoaPods/security/advisories/GHSA-j483-qm5c-7hqx https://github.com/CocoaPods/trunk.cocoapods.org/commit/71be5440906b6bdfbc0bcc7f8a9fec33367ea0f4 • CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. Prior to commit d4fa66f49cedab449af9a56a21ab40697b9f7b97, the trunk sessions verification step could be manipulated for owner session hijacking Compromising a victim’s session will result in a full takeover of the CocoaPods trunk account. The threat actor could manipulate their pod specifications, disrupt the distribution of legitimate libraries, or cause widespread disruption within the CocoaPods ecosystem. This was patched server-side with commit d4fa66f49cedab449af9a56a21ab40697b9f7b97 in October 2023. trunk.cocoapods.org es el servidor de autenticación para el administrador de dependencias de CoacoaPods. Antes del commit d4fa66f49cedab449af9a56a21ab40697b9f7b97, el paso de verificación de las sesiones troncales podría manipularse para secuestrar la sesión del propietario. • https://blog.cocoapods.org/CocoaPods-Trunk-RCEs-2023 https://evasec.io/blog/eva-discovered-supply-chain-vulnerabities-in-cocoapods#vulnerability-3-achieving-zero-click-account-takeover-by-defeating-email-security-boundaries https://github.com/CocoaPods/CocoaPods/security/advisories/GHSA-52gf-m7v9-m333 https://github.com/CocoaPods/trunk.cocoapods.org/commit/d4fa66f49cedab449af9a56a21ab40697b9f7b97 • CWE-488: Exposure of Data Element to Wrong Session •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. The part of trunk which verifies whether a user has a real email address on signup used a rfc-822 library which executes a shell command to validate the email domain MX records validity. It works via an DNS MX. This lookup could be manipulated to also execute a command on the trunk server, effectively giving root access to the server and the infrastructure. This issue was patched server-side with commit 001cc3a430e75a16307f5fd6cdff1363ad2f40f3 in September 2023. • https://github.com/ReeFSpeK/CocoaPods-RCE_CVE-2024-38366 https://blog.cocoapods.org/CocoaPods-Trunk-RCEs-2023 https://evasec.webflow.io/blog/eva-discovered-supply-chain-vulnerabities-in-cocoapods#2-remote-code-execution-on-the-cocoapods-trunk-server https://github.com/CocoaPods/CocoaPods/security/advisories/GHSA-x2x4-g675-qg7c • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The package cocoapods-downloader before 1.6.2 are vulnerable to Command Injection via hg argument injection. When calling the download function (when using hg), the url (and/or revision, tag, branch) is passed to the hg clone command in a way that additional flags can be set. The additional flags can be used to perform a command injection. El paquete cocoapods-downloader versiones anteriores a 1.6.2, es vulnerable a la inyección de comandos por medio de una inyección de argumentos hg. Cuando es llamada a la función de descarga (cuando se usa hg), la url (y/o revisión, etiqueta, rama) es pasada al comando hg clone de forma que pueden establecerse flags adicionales. • https://github.com/CocoaPods/cocoapods-downloader/pull/127 https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414280 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

The package cocoapods-downloader before 1.6.0, from 1.6.2 and before 1.6.3 are vulnerable to Command Injection via git argument injection. When calling the Pod::Downloader.preprocess_options function and using git, both the git and branch parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection. El paquete cocoapods-downloader versiones anteriores a 1.6.0, a partir de la 1.6.2 y anteriores a 1.6.3 son vulnerables a la inyección de comandos por medio de una inyección de argumentos git. Cuando es llamada a la función Pod::Downloader.preprocess_options y es usado git, tanto el parámetro git como el de la rama son pasados al subcomando git ls-remote de forma que pueden establecerse flags adicionales. • https://github.com/CocoaPods/cocoapods-downloader/pull/124 https://github.com/CocoaPods/cocoapods-downloader/pull/128 https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414278 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •