7.5
CVSSv2

CVE-2022-25865

Published: 13/05/2022 Updated: 08/08/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The package workspace-tools prior to 0.18.4 are vulnerable to Command Injection via git argument injection. When calling the fetchRemoteBranch(remote: string, remoteBranch: string, cwd: string) function, both the remote and remoteBranch parameters are passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft workspace-tools

Github Repositories

Run POC to patch lower versions of workspace-tools

POC-workspace-tools Do a POC to patch lower versions of workspace-tools Background information nvdnistgov/vuln/detail/CVE-2022-25865 CVSS: 98 Critical Vulnerable Environment: OS: Ubuntu 18046 LTS npm: 8110 nodejs: v16142 workspace-tools@0162 Patch Recommendation: Upgrade to v0184 The Dilemma and POC !!! Developers using workspace-tools@0162 might not wan