sbt: Source dependency feature (via crafted VCS URL) leads to arbitrary code execution on Windows
On Windows, sbt uses Process("cmd", "/c", …) to run VCS commands (git, hg, svn). The URI fragment (branch, tag, revision) is user-controlled via the build definition and passed to these commands without validation. Because cmd /c interprets &, |, and ; as command separators, a malicious fragment can execute arbitrary commands.