CVE-2022-24437 – Command Injection
https://notcve.org/view.php?id=CVE-2022-24437
The package git-pull-or-clone before 2.0.2 are vulnerable to Command Injection due to the use of the --upload-pack feature of git which is also supported for git clone. The source includes the use of the secure child process API spawn(). However, the outpath parameter passed to it may be a command-line argument to the git clone command and result in arbitrary command injection. El paquete git-pull-or-clone versiones anteriores a 2.0.2, es vulnerable a una inyección de comandos debido al uso de la función --upload-pack de git, que también es compatible con git clone. La fuente incluye el uso de la API spawn() del proceso hijo seguro. • https://gist.github.com/lirantal/327e9dd32686991b5a1fa6341aac2e7b https://github.com/feross/git-pull-or-clone/commit/f9ce092be13cc32e685dfa26e7705e9c6e3108a3 https://snyk.io/vuln/SNYK-JS-GITPULLORCLONE-2434307 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •