Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. ggit
  4. ›
  5. CVE-2024-21533

CVE-2024-21533: ggit is vulnerable to Arbitrary Argument Injection via the clone() API

October 8, 2024

All versions of the package ggit are vulnerable to Arbitrary Argument Injection via the clone() API, which allows specifying the remote URL to clone and the file on disk to clone to. The library does not sanitize for user input or validate a given URL scheme, nor does it properly pass command-line flags to the git binary using the double-dash POSIX characters (–) to communicate the end of options.

References

  • gist.github.com/lirantal/80c6d59ac1b682a32bc9d2ff92044bb9
  • github.com/advisories/GHSA-pr45-cg4x-ff4m
  • github.com/bahmutov/ggit
  • nvd.nist.gov/vuln/detail/CVE-2024-21533
  • security.snyk.io/vuln/SNYK-JS-GGIT-5731319

Code Behaviors & Features

Detect and mitigate CVE-2024-21533 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 2.4.12

Solution

Unfortunately, there is no solution available yet.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

Source file

npm/ggit/CVE-2024-21533.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:41 +0000.