Exploit
CVE-2022-24066

Improper Neutralization of Special Elements used in a Command ('Command Injection') (CWE-77)

Published: Apr 1, 2022 / Updated: 31mo ago

010
CVSS 9.8EPSS 0.15%Critical
CVE info copied to clipboard

The package simple-git before 3.5.0 are vulnerable to Command Injection due to an incomplete fix of [CVE-2022-24433](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199) which only patches against the git fetch attack vector. A similar use of the --upload-pack feature of git is also supported for git clone, which the prior fix didn't cover.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Timeline

First Article

Feedly found the first article mentioning CVE-2022-24066. See article

Apr 1, 2022 at 8:25 PM / github.com
EPSS

EPSS Score was set to: 0.15% (Percentile: 50.6%)

Sep 21, 2023 at 2:01 AM
Threat Intelligence Report

CVE-2022-24066 is a critical vulnerability in a package that allows for Argument Injection due to an incomplete fix of a previous CVE. It is currently being exploited in the wild by threat actors, and while there are no proof-of-concept exploits available, patches are available to mitigate the risk. Downstream impacts may affect other third-party vendors who rely on the vulnerable package. See article

Aug 17, 2024 at 3:03 PM
Static CVE Timeline Graph

Affected Systems

Simple-git_project/simple-git
+null more

Exploits

https://gist.github.com/lirantal/a930d902294b833514e821102316426b
+null more

Patches

snyk.io
+null more

Attack Patterns

CAPEC-136: LDAP Injection
+null more

References

Rewterz Threat Advisory – CVE-2022-24066 – Node.js simple-git module Vulnerability
Node.js simple-git module could allow a remote attacker to execute arbitrary commands on the system, caused by command injection flaw. By sending a specially-crafted request using the the –upload-pack feature, an attacker could exploit this vulnerability to execute arbitrary commands on the system.
HTB: FormulaX
In Beyond Root I’ll show some unintended paths, first using a weird permissions setting on the LibreNMS directory to skip the SNMP trap exploitation, and then using the LibreOffice Calc API to write formulas into a worksheet that read files from the file system, which I’ll turn into a nice Python script to get arbitrary file read. When I get access to the server, I can see that is loading, which is what gets the messages from the server, and then loads them into the page with this code by setting it’s, which doesn’t trigger the loading of the tag.
Vulnerability Summary for the Week of April 4, 2022
Original release date: April 11, 2022 High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info escanav -- escan_anti-virus An local privilege escalation vulnerability due to a "runasroot" command in eScan Anti-Virus. This vulnerability is due to invalid arguments and insufficient execution conditions related to "runasroot" command. This vulnerability can induce remote attackers to exploit root privileges by manipulating parameter values. 2022-04-01 10 CVE-2021-26624 MISC pagekit -- pagekit pagekit all versions, as of 15-10-2021, is vulnerable to SQL Injection via Comment listing. 2022-04-01 10 CVE-2021-44135 MISC allmediaserver -- allmediaserver Mediaserver.exe in ALLMediaServer 1.6 has a stack-based buffer overflow that allows remote attackers to execute arbitrary code via a long string to TCP port 888, a related issue to CVE-2017-17932. 2022-04-03 10 CVE-2022-28381 MISC MISC qualcomm -- apq8096au_firmware An Out of Bounds read may potentially occur while processing an IBSS beacon, in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music 2022-04-01 9.4 CVE-2021-35117 CONFIRM dell -- wyse_management_suite Dell Wyse Management Suite versions 2.0 through 3.5.2 contain an unrestricted file upload vulnerability. A malicious user with admin privileges can exploit this vulnerability in order to execute arbitrary code on the system. 2022-04-01 9 CVE-2022-23155 CONFIRM hitrontech -- chita_firmware Hitron CHITA 7.2.2.0.3b6-CD devices contain a command injection vulnerability via the Device/DDNS ddnsUsername field. 2022-04-01 9 CVE-2022-25017 MISC idearespa -- reftree An unrestricted file upload vulnerability in IdeaRE RefTree before 2021.09.17 allows remote authenticated users to execute arbitrary code by using UploadDwg to upload a crafted aspx file to the web root, and then visiting the URL for this aspx resource.
See 1 more references

News

HTB: FormulaX
In Beyond Root I’ll show some unintended paths, first using a weird permissions setting on the LibreNMS directory to skip the SNMP trap exploitation, and then using the LibreOffice Calc API to write formulas into a worksheet that read files from the file system, which I’ll turn into a nice Python script to get arbitrary file read. When I get access to the server, I can see that is loading, which is what gets the messages from the server, and then loads them into the page with this code by setting it’s, which doesn’t trigger the loading of the tag.
Multiple vulnerabilities in IBM i Modernization Engine for Lifecycle Integration
A remote attacker can pass specially crafted data to the application via the new Range function and perform regular expression denial of service (ReDos) attack. A remote attacker can pass specially crafted data to the application and perform regular expression denial of service (ReDos) attack.
CVE-2022-25912 Exploit
CVE Id : CVE-2022-25912 Published Date: 2022-12-07T16:21:00+00:00 The package simple-git before 3.15.0 are vulnerable to Remote Code Execution (RCE) when enabling the ext transport protocol, which makes it exploitable via clone() method. This vulnerability exists due to an incomplete fix of [CVE-2022-24066](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306). inTheWild added a link to an exploit: https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3153532
simple-git vulnerable to Remote Code Execution when enabling the ext transport protocol
GitHub Security Advisory: GHSA-9p95-fxvg-qgq2 Release Date: 2022-12-06 Update Date: 2022-12-07 Severity: High CVE-2022-25912 Base Score: 8.1 Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Package Information Package: simple-git Affected Versions: Patched Versions: 3.15.0 Description The package simple-git before 3.15.0 is vulnerable to Remote Code Execution (RCE) when enabling the ext transport protocol, which makes it exploitable via clone() method.
CVE-2022-25912
The package simple-git before 3.15.0 are vulnerable to Remote Code Execution (RCE) when enabling the ext transport protocol, which makes it exploitable via clone() method. This vulnerability exists due to an incomplete fix of [CVE-2022-24066](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306). (CVSS:0.0) (Last Update:2022-12-06)
See 25 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI