This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Simple Git < 3.36.0 has a **Code Injection** flaw. Itβs an incomplete fix for CVE-2022-25912. π₯ **Consequences**: Attackers can achieve **Remote Code Execution (RCE)** via malicious clone sources.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: **CWE-94** (Code Injection). The vulnerability stems from improper handling of `protocol.ext.allow=always` and `ext::` clone sources, allowing arbitrary command execution.
Q3Who is affected? (Versions/Components)
π¦ **Affected**: **Simple Git** library for Node.js. Specifically versions **before 3.36.0**. Developed by Steve King. π **Impact**: Any Node.js app using this lib is at risk.
Q4What can hackers do? (Privileges/Data)
π **Attacker Power**: Full **Remote Code Execution**. CVSS Score is **9.8 (Critical)**. Attackers gain High Confidentiality, Integrity, and Availability impact. They can run **any system command**.
Q5Is exploitation threshold high? (Auth/Config)
β οΈ **Exploitation**: **Low Threshold**. CVSS: AV:N (Network), AC:L (Low Complexity), PR:N (No Privs), UI:N (No User Interaction). You just need to trigger a git clone with a malicious source.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exp?**: Yes. References include GitHub commits and Gist PoCs (e.g., KKC73). Snyk also tracks it. Wild exploitation is **highly likely** given the low barrier.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan your `package.json` or `node_modules`. Look for `simple-git` version **< 3.36.0**. Check if your app uses `protocol.ext` or custom clone sources.
Q8Is it fixed officially? (Patch/Mitigation)
β **Fixed?**: Yes. Upgrade to **Simple Git 3.36.0** or later. The patch addresses the incomplete fix from the previous CVE. π **Ref**: GitHub commit 89a2294.
Q9What if no patch? (Workaround)
π§ **No Patch?**: **Mitigation**: Disable `protocol.ext.allow` or avoid using `ext::` clone protocols. Sanitize all git URLs. Do not allow untrusted sources to trigger git commands.
Q10Is it urgent? (Priority Suggestion)
π₯ **Urgency**: **CRITICAL**. CVSS 9.8 + RCE + Low Exploit Difficulty. Patch **IMMEDIATELY**. This is a high-priority security update for all Node.js projects.