
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-25860 affects versions of the simple-git package before 3.16.0, exposing a Remote Code Execution (RCE) vulnerability through the clone(), pull(), push() and listRemote() methods due to improper input sanitization. This vulnerability is particularly notable as it exists due to an incomplete fix of a previous vulnerability CVE-2022-25912 (NVD, Snyk).
The vulnerability stems from improper input sanitization in several git operations. The affected methods include clone(), pull(), push(), and listRemote(), which can be exploited through custom upload and receive pack options. The vulnerability has received a CVSS v3.1 base score of 9.8 (CRITICAL) from NVD and 8.1 (HIGH) from Snyk, indicating its severe nature. The vulnerability specifically relates to unsafe pack operations, including the use of --upload-pack, --receive-pack, and the -u option in clone operations (GitHub Commit).
If exploited, this vulnerability could allow attackers to execute arbitrary code on the affected system through various git operations. The impact is particularly severe as it allows for complete compromise of system confidentiality, integrity, and availability, with the potential for total loss of protection (Snyk).
The primary mitigation is to upgrade simple-git to version 3.16.0 or higher. For cases where immediate upgrade is not possible, the package introduced an allowUnsafePack configuration option that must be explicitly enabled to use potentially dangerous operations (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."