Closed
Description
This appeared in the CVE feed today: https://security.snyk.io/vuln/SNYK-PYTHON-GITPYTHON-3113858
Not sure if this was reported to you before or not, reporting it here just in case.
This appeared in the CVE feed today: https://security.snyk.io/vuln/SNYK-PYTHON-GITPYTHON-3113858
Not sure if this was reported to you before or not, reporting it here just in case.
Activity
Byron commentedon Dec 6, 2022
I am aware, have been informed and we can track it here. Thanks a lot for setting up this issue so timely.
[-]CVE-2022-24439[/-][+]CVE-2022-24439: `<gitpython::clone> 'ext::sh -c touch% /tmp/pwned'` for remote code execution[/+]ajakk commentedon Dec 6, 2022
@Byron, had Snyk or Sam Wheating (@SamWheating?) contacted you previously about this or did you learn about it independently? I'm curious given there's no reference to any upstream report in the above Snyk report.
SamWheating commentedon Dec 6, 2022
I reached out to Snyk, who I believe got in touch with the maintainers.
ajakk commentedon Dec 6, 2022
What makes you think that? Again, just curious given there doesn't seem to be any indication of that happening according to their report. Also, why did you go to Snyk rather than to upstream?
Byron commentedon Dec 6, 2022
Snyk did reach out to me by email, to my mind all this went pretty well. By publishing the issue the community can contribute a mitigation.
ajakk commentedon Dec 6, 2022
Yeah, seems fine to me. It would have been nice to have an existing public report to go with the public release of the CVE so that all the people who handle CVEs (myself, and the reporter of this issue, for example) would know that the issue is already known to upstream and we don't have to spend time extracting that information via issues like this.
Thank you for the insight.
stsewd commentedon Dec 6, 2022
Looks like this same vulnerability has been reported in another git library (simple-git), https://www.cve.org/CVERecord?id=CVE-2022-25912.
They added an option to opt-in in to the insecure behavior
And this should probably check for https://www.cve.org/CVERecord?id=CVE-2022-24433 too (
git clone file:///tmp/zero123 /tmp/example-new-repo --upload-pack='touch /tmp/pwn'
)https://github.com/steveukx/git-js/blob/fc10fbe1cba2dedfccd8e5507b61fc979addb252/simple-git/src/lib/tasks/clone.ts#L46-L49
SamWheating commentedon Dec 6, 2022
Snyk's vulnerability program is fantastic - you can report an issue to them and they will review it, triage it, try to get in contact with the maintainers and then register the CVE if applicable. It eliminates a lot of the overhead on my end and helps to ensure that a vulnerability is handled appropriately.
https://docs.snyk.io/more-info/disclosing-vulnerabilities/disclose-a-vulnerability-in-an-open-source-package
I didn't have a direct line to the maintainers and I didn't want to open a public issue explaining a potentially sensitive vulnerability. In this case it sounds like Snyk was able to get in touch on my behalf and handle this disclosure responsibly.
jacwalte commentedon Dec 8, 2022
Just thought I would ping to keep this issue active. This is a critical issue in my org. Can we get a status update? Is a fix expected soon?
Byron commentedon Dec 8, 2022
No fix is plannedI don't plan to work on this directly, and this issue is triaged as 'help wanted'. Indirectly I am working on it by answering here and following up on the PR which might alleviate the problem.54 remaining items