Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
GitPython: Newline injection in config_writer().set_value() enables RCE via core.hooksPath
Vulnerability Description
GitPython is a python library used to interact with Git repositories. Prior to version 3.1.49, GitConfigParser.set_value() passes values to Python's configparser without validating for newlines. GitPython's own _write() converts embedded newlines into indented continuation lines (e.g. \n becomes \n\t), but Git still accepts an indented [core] stanza as a section header — so the injected core.hooksPath becomes effective configuration. Any Git operation that invokes hooks (commit, merge, checkout) will then execute scripts from the attacker-controlled path. This issue has been patched in version 3.1.49.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Vulnerability Title
GitPython 代码注入漏洞
Vulnerability Description
GitPython是gitpython-developers开源的一个用于与 Git 存储库交互的 Python 库。 GitPython 3.1.49之前版本存在代码注入漏洞,该漏洞源于GitConfigParser.set_value()将值传递给Python的configparser时未验证换行符,可能导致攻击者注入core.hooksPath配置,任何调用钩子的Git操作将执行攻击者控制路径下的脚本。
CVSS Information
N/A
Vulnerability Type
N/A