git-fastclone before 1.0.5 passes user modifiable strings directly to a shell command. An attacker can execute malicious commands by modifying the strings that are passed as arguments to "cd " and "git clone " commands in the library.
[
{
"product": "git-fastclone ruby gem All versions before 1.0.5",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "git-fastclone ruby gem All versions before 1.0.5"
}
]
}
]