The package prior to v1.11.0 is vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {})
function, the remote parameter is passed to the git fetch
subcommand in a way such that additional flags can be set. The additional flags can be used to perform a command injection.
{ "nvd_published_at": "2022-04-19T17:15:00Z", "cwe_ids": [ "CWE-88" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2022-04-28T21:13:22Z" }