CVE-2020-26222

Source
https://cve.org/CVERecord?id=CVE-2020-26222
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-26222.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-26222
Aliases
Related
Published
2020-11-13T16:15:18.277Z
Modified
2026-02-18T07:23:25.873918Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Dependabot is a set of packages for automated dependency management for Ruby, JavaScript, Python, PHP, Elixir, Rust, Java, .NET, Elm and Go. In Dependabot-Core from version 0.119.0.beta1 before version 0.125.1, there is a remote code execution vulnerability in dependabot-common and dependabot-go_modules when a source branch name contains malicious injectable bash code. For example, if Dependabot is configured to use the following source branch name: "/$({curl,127.0.0.1})", Dependabot will make a HTTP request to the following URL: 127.0.0.1 when cloning the source repository. The fix was applied to version 0.125.1. As a workaround, one can escape the branch name prior to passing it to the Dependabot::Source class.

References

Affected packages

Git / github.com/dependabot/dependabot-core

Affected ranges

Type
GIT
Repo
https://github.com/dependabot/dependabot-core
Events

Affected versions

v0.*
v0.119.1
v0.119.2
v0.119.3
v0.119.4
v0.119.5
v0.119.6
v0.120.0
v0.120.1
v0.120.2
v0.120.3
v0.120.4
v0.120.5
v0.121.0
v0.121.1
v0.122.0
v0.122.1
v0.123.0
v0.123.1
v0.124.0
v0.124.1
v0.124.2
v0.124.3
v0.124.4
v0.124.5
v0.124.6
v0.124.7
v0.124.8
v0.125.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-26222.json"