GHSA-7627-mp87-jf6q

Source
https://github.com/advisories/GHSA-7627-mp87-jf6q
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/04/GHSA-7627-mp87-jf6q/GHSA-7627-mp87-jf6q.json
Aliases
Published
2022-04-02T00:00:13Z
Modified
2023-11-08T04:08:31.482309Z
Details

The package cocoapods-downloader before 1.6.0, from 1.6.2 and before 1.6.3 are vulnerable to Command Injection via git argument injection. When calling the Pod::Downloader.preprocess_options function and using git, both the git and branch parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.

References

Affected packages

RubyGems / cocoapods-downloader

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
1.6.0

Affected versions

0.*

0.1.0
0.1.1
0.1.2
0.2.0
0.3.0
0.4.0
0.4.1
0.5.0
0.6.0
0.6.1
0.7.0
0.7.1
0.7.2
0.8.0
0.8.1
0.9.0
0.9.1
0.9.2
0.9.3

1.*

1.0.0.beta.1
1.0.0.beta.2
1.0.0.beta.3
1.0.0.rc.1
1.0.0
1.0.1
1.1.0
1.1.1
1.1.2
1.1.3
1.2.0
1.2.1
1.2.2
1.3.0
1.4.0
1.5.0
1.5.1

RubyGems / cocoapods-downloader

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.6.2
Fixed
1.6.3

Affected versions

1.*

1.6.2