1 results (0.002 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

The package czproject/git-php before 4.0.3 are vulnerable to Command Injection via git argument injection. When calling the isRemoteUrlReadable($url, array $refs = NULL) function, both the url and refs parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection. El paquete czproject/git-php versiones anteriores a 4.0.3, es vulnerable a una inyección de comandos por medio de una inyección de argumentos git. Cuando es llamado a la función isRemoteUrlReadable($url, array $refs = NULL), los parámetros url y refs son pasados al subcomando git ls-remote de forma que puedan establecerse flags adicionales. • https://github.com/czproject/git-php/commit/5e82d5479da5f16d37a915de4ec55e1ac78de733 https://github.com/czproject/git-php/releases/tag/v4.0.3 https://snyk.io/vuln/SNYK-PHP-CZPROJECTGITPHP-2421349 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •