The package simple-git before 3.15.0 are vulnerable to Remote Code Execution (RCE) when enabling the ext transport protocol, which makes it exploitable via clone() method. This vulnerability exists due to an incomplete fix of [CVE-2022-24066](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306).
References
Configurations
History
22 Apr 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/steveukx/git-js/blob/main/docs/PLUGIN-UNSAFE-ACTIONS.md%23overriding-allowed-protocols - Broken Link | |
References | () https://github.com/steveukx/git-js/releases/tag/simple-git%403.15.0 - Release Notes, Third Party Advisory | |
References | () https://github.com/steveukx/git-js/commit/774648049eb3e628379e292ea172dccaba610504 - Patch, Third Party Advisory | |
References | () https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221 - Exploit, Patch, Third Party Advisory | |
References | () https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3153532 - Exploit, Patch, Third Party Advisory |
08 Aug 2023, 14:21
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-78 |
Information
Published : 2022-12-06 05:15
Updated : 2025-04-22 21:15
NVD link : CVE-2022-25912
Mitre link : CVE-2022-25912
JSON object : View
Products Affected
simple-git_project
- simple-git
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')