Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
CVE–2022–24433![shield](https://camo.githubusercontent.com/04e752e6d1c9ffe7ecdcd3678ec3a20eb7b7433a7a719f86a8678645f34970d2/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f637269746963616c332d322d30312e737667)
Vulnerable dependency: simple-git (npm)
1.107.0
Vulnerability details
Description
Improper Neutralization of Special Elements used in a Command ('Command Injection')
NVD
GitHub
CVSS details -
9.8
References
NVD - CVE-2022-24433![link](https://camo.githubusercontent.com/b1d172bf8cccad8f645a71725f852619afd7e1d76527acd8c6aa1d68b53a50bb/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/b1d172bf8cccad8f645a71725f852619afd7e1d76527acd8c6aa1d68b53a50bb/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/b1d172bf8cccad8f645a71725f852619afd7e1d76527acd8c6aa1d68b53a50bb/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/b1d172bf8cccad8f645a71725f852619afd7e1d76527acd8c6aa1d68b53a50bb/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
Command injection in simple-git · CVE-2022-24433 · GitHub Advisory Database · GitHub
Release simple-git@3.3.0 · steveukx/git-js · GitHub
Prevent use of
--upload-pack
as a command ingit.fetch
to avoid p… by steveukx · Pull Request #767 · steveukx/git-js · GitHubRelated information
📌 Remember! Check the changes to ensure they don't introduce any breaking changes.
📚 Read more about the CVE