Lucene search

K
rubygemsRubySecRUBY:COCOAPODS-DOWNLOADER-2022-21223
HistoryApr 01, 2022 - 9:00 p.m.

Command injection in cocoapods-downloader

2022-04-0121:00:00
RubySec
github.com
3
cocoapods-downloader
command injection
hg argument

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

The package cocoapods-downloader before 1.6.2 are vulnerable to Command
Injection via hg argument injection. When calling the download function (when using
hg), the url (and/or revision, tag, branch) is passed to the hg clone command in
a way that additional flags can be set. The additional flags can be used to perform
a command injection.

Affected configurations

Vulners
Node
rubycocoapods-downloaderRange1.6.2
VendorProductVersionCPE
rubycocoapods-downloader*cpe:2.3:a:ruby:cocoapods-downloader:*:*:*:*:*:*:*:*

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Related for RUBY:COCOAPODS-DOWNLOADER-2022-21223