RubySec

Providing security resources for the Ruby community

CVE-2015-8969 (git-fastclone): git-fastclone Shell Metacharacter Injection Arbitrary Command Execution

ADVISORIES

GEM

git-fastclone

PATCHED VERSIONS

  • >= 1.0.5

DESCRIPTION

git-fastclone before 1.0.5 passes user modifiable strings directly to a shell command. An attacker can execute malicious commands by modifying the strings that are passed as arguments to “cd “ and “git clone “ commands in the library.