CVE-2021-34081: OS Command Injection in gitsome
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.90436%
CWE
Published
6/3/2022
Updated
1/27/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| gitsome | npm | <= 0.2.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability explicitly involves crafted tag names enabling OS command injection. This implies: 1) The package interacts with git CLI to process tags 2) Tag names are used unsafely in command construction 3) Node.js child_process methods (exec/execSync) without proper sanitization are likely involved. While exact code isn't available, the version calculation functionality (gs.version()) that processes git tags would be the logical injection point. The high confidence comes from the direct match between the vulnerability description and common OS command injection patterns in git interaction code.