RubySec

Providing security resources for the Ruby community

CVE-2022-46648 (git): Potential remote code execution in ruby-git

ADVISORIES

GEM

git

SEVERITY

CVSS v3.x: 5.5 (Medium)

UNAFFECTED VERSIONS

  • < 1.2.0

PATCHED VERSIONS

  • >= 1.13.0

DESCRIPTION

The git gem, between versions 1.2.0 and 1.12.0, incorrectly parsed the output of the 'git ls-files' command using eval() to unescape quoted file names. If a file name was added to the git repository contained special characters, such as '\n', then the 'git ls-files' command would print the file name in quotes and escape any special characters. If the 'Git#ls_files' method encountered a quoted file name it would use eval() to unquote and unescape any special characters, leading to potential remote code execution. Version 1.13.0 of the git gem was released which correctly parses any quoted file names.

RELATED