Miggo Logo

CVE-2019-10802: OS Command Injection in giting

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.6975%
Published
4/13/2021
Updated
9/13/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
gitingnpm<= 0.0.8

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly states the first argument 'repo' of pull() is vulnerable. The commit diff shows the fix added encodeURIComponent(repo.branch) in three locations (fetch/checkout/pull), but the primary vulnerable entry point is pull() as referenced in all advisories. The function directly interpolates repo.branch into a child.exec command without validation, making it susceptible to command injection when attacker-controlled values are passed to the branch property of the repo object.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*itin* v*rsion prior to *.*.* *llows *x**ution o* *r*rit*ry *omm*n*s. T** *irst *r*um*nt `r*po` o* *un*tion `pull()` is *x**ut** *y t** p**k*** wit*out *ny v*li**tion.

Reasoning

T** vuln*r**ility **s*ription *xpli*itly st*t*s t** *irst *r*um*nt 'r*po' o* `pull()` is vuln*r**l*. T** *ommit *i** s*ows t** *ix ***** `*n*o**URI*ompon*nt(r*po.*r*n**)` in t*r** lo**tions (**t**/****kout/pull), *ut t** prim*ry vuln*r**l* *ntry poin