
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-24439 affects all versions of GitPython, a Python library used to interact with Git repositories. The vulnerability was discovered by Sam Wheating and disclosed on December 6, 2022. This Remote Code Execution (RCE) vulnerability exists due to improper user input validation in the package's clone command functionality (Snyk, NVD).
The vulnerability stems from insufficient sanitization of input arguments when making external calls to git, specifically allowing injection of maliciously crafted remote URLs into the clone command. The issue is particularly relevant when the ext transport protocol is enabled. The vulnerability has been assigned a CVSS v3 base score of 9.8 (Critical), indicating high severity with network attack vector, low attack complexity, and no required privileges or user interaction (AttackerKB, Snyk).
If exploited, this vulnerability can lead to Remote Code Execution, potentially allowing attackers to execute arbitrary commands on the affected system. The impact includes potential total loss of confidentiality, integrity, and availability of the affected system, as indicated by the CVSS metrics (Snyk).
The vulnerability has been fixed in GitPython version 3.1.30 and later. Users are strongly advised to upgrade to the latest version. For Debian systems, security updates have been released (version 2.1.11-1+deb10u1 for Debian 10 and 3.1.14-1+deb11u1 for Debian 11). Fedora has also released security updates for versions 36, 37, and 38 (Debian LTS, Gentoo).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."