git-fastclone prior to 1.0.5 passes user modifiable strings directly to a shell command. An attacker can execute malicious commands by modifying the strings that are passed as arguments to "cd " and "git clone " commands in the library.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
squareup git-fastclone |