Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
CVE–2022–25912![shield](https://camo.githubusercontent.com/04e752e6d1c9ffe7ecdcd3678ec3a20eb7b7433a7a719f86a8678645f34970d2/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f637269746963616c332d322d30312e737667)
Vulnerability details
Description
Improper Neutralization of Special Elements used in a Command ('Command Injection')
NVD
GitHub
GitLab Advisory Database (Open Source Edition)
CVSS details -
9.8
References
NVD - CVE-2022-25912![link](https://camo.githubusercontent.com/b1d172bf8cccad8f645a71725f852619afd7e1d76527acd8c6aa1d68b53a50bb/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/b1d172bf8cccad8f645a71725f852619afd7e1d76527acd8c6aa1d68b53a50bb/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/b1d172bf8cccad8f645a71725f852619afd7e1d76527acd8c6aa1d68b53a50bb/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/b1d172bf8cccad8f645a71725f852619afd7e1d76527acd8c6aa1d68b53a50bb/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/b1d172bf8cccad8f645a71725f852619afd7e1d76527acd8c6aa1d68b53a50bb/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/b1d172bf8cccad8f645a71725f852619afd7e1d76527acd8c6aa1d68b53a50bb/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/b1d172bf8cccad8f645a71725f852619afd7e1d76527acd8c6aa1d68b53a50bb/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/b1d172bf8cccad8f645a71725f852619afd7e1d76527acd8c6aa1d68b53a50bb/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
simple-git vulnerable to Remote Code Execution when enabling the ext transport protocol · CVE-2022-25912 · GitHub Advisory Database · GitHub
npm/simple-git/CVE-2022-25912.yml · main · GitLab.org / GitLab Advisory Database Open Source Edition · GitLab
Release [email protected] · steveukx/git-js · GitHub
Remote Code Execution (RCE) in org.webjars.npm:simple-git | CVE-2022-25912 | Snyk
Remote Code Execution (RCE) in simple-git | CVE-2022-25912 | Snyk
THIRD PARTY
Chore: bump lerna, jest and create prettier workflow (#862) · steveukx/git-js@7746480 · GitHub
Related information
📌 Remember! Check the changes to ensure they don't introduce any breaking changes.
📚 Read more about the CVE