github.com/rancher/rancher is vulnerable to Command Injection. The vulnerability exists because git.go
doesn’t properly validate user input, allowing an attacker to inject and execute maliciously crafted commands through the rancher host.
bugzilla.suse.com/show_bug.cgi?id=1205294
github.com/advisories/GHSA-34p5-jp77-fcrc
github.com/rancher/rancher/commit/6ad4bba7984c86f40b02613d6c587d6a63d3e99d
github.com/rancher/rancher/commit/a230f24f869ddce133d5e36452f9fd5b5c4cc254
github.com/rancher/rancher/commit/af02fbac8702bd8e1cb70addba7783161865c7a4
github.com/rancher/rancher/pull/40242
github.com/rancher/rancher/pull/40243
github.com/rancher/rancher/pull/40244