Skip to content

CVE-2022-24439: <gitpython::clone> 'ext::sh -c touch% /tmp/pwned' for remote code execution #1515

Closed
@mmuehlenhoff

Description

@mmuehlenhoff

This appeared in the CVE feed today: https://security.snyk.io/vuln/SNYK-PYTHON-GITPYTHON-3113858

Not sure if this was reported to you before or not, reporting it here just in case.

Activity

Byron

Byron commented on Dec 6, 2022

@Byron
Member

I am aware, have been informed and we can track it here. Thanks a lot for setting up this issue so timely.

changed the title [-]CVE-2022-24439[/-] [+]CVE-2022-24439: `<gitpython::clone> 'ext::sh -c touch% /tmp/pwned'` for remote code execution[/+] on Dec 6, 2022
ajakk

ajakk commented on Dec 6, 2022

@ajakk

@Byron, had Snyk or Sam Wheating (@SamWheating?) contacted you previously about this or did you learn about it independently? I'm curious given there's no reference to any upstream report in the above Snyk report.

SamWheating

SamWheating commented on Dec 6, 2022

@SamWheating

I reached out to Snyk, who I believe got in touch with the maintainers.

ajakk

ajakk commented on Dec 6, 2022

@ajakk

I reached out to Snyk, who I believe got in touch with the maintainers.

What makes you think that? Again, just curious given there doesn't seem to be any indication of that happening according to their report. Also, why did you go to Snyk rather than to upstream?

Byron

Byron commented on Dec 6, 2022

@Byron
Member

Snyk did reach out to me by email, to my mind all this went pretty well. By publishing the issue the community can contribute a mitigation.

ajakk

ajakk commented on Dec 6, 2022

@ajakk

Yeah, seems fine to me. It would have been nice to have an existing public report to go with the public release of the CVE so that all the people who handle CVEs (myself, and the reporter of this issue, for example) would know that the issue is already known to upstream and we don't have to spend time extracting that information via issues like this.

Thank you for the insight.

stsewd

stsewd commented on Dec 6, 2022

@stsewd
Contributor
SamWheating

SamWheating commented on Dec 6, 2022

@SamWheating

What makes you think that? Again, just curious given there doesn't seem to be any indication of that happening according to their report. Also, why did you go to Snyk rather than to upstream?

Snyk's vulnerability program is fantastic - you can report an issue to them and they will review it, triage it, try to get in contact with the maintainers and then register the CVE if applicable. It eliminates a lot of the overhead on my end and helps to ensure that a vulnerability is handled appropriately.

https://docs.snyk.io/more-info/disclosing-vulnerabilities/disclose-a-vulnerability-in-an-open-source-package

I didn't have a direct line to the maintainers and I didn't want to open a public issue explaining a potentially sensitive vulnerability. In this case it sounds like Snyk was able to get in touch on my behalf and handle this disclosure responsibly.

jacwalte

jacwalte commented on Dec 8, 2022

@jacwalte

Just thought I would ping to keep this issue active. This is a critical issue in my org. Can we get a status update? Is a fix expected soon?

Byron

Byron commented on Dec 8, 2022

@Byron
Member

No fix is planned I don't plan to work on this directly, and this issue is triaged as 'help wanted'. Indirectly I am working on it by answering here and following up on the PR which might alleviate the problem.

54 remaining items

Loading
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

      Participants

      @Byron@mcepl@Anthony-Mckale@stsewd@mmuehlenhoff

      Issue actions

        CVE-2022-24439: `<gitpython::clone> 'ext::sh -c touch% /tmp/pwned'` for remote code execution · Issue #1515 · gitpython-developers/GitPython