CVE-2024-21533: ggit is vulnerable to Arbitrary Argument Injection via the clone() API
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.09855%
CWE
Published
10/8/2024
Updated
10/8/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| ggit | npm | <= 2.4.12 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability documentation and PoC explicitly reference the clone() API being vulnerable, which maps to the cloneRepo function in the ggit package. The function's failure to sanitize inputs and properly format git arguments matches the described attack pattern. The high confidence comes from: 1) Direct match between documented vulnerable API (clone()) and exported function name (cloneRepo) 2) Reproduction proof using this function 3) Typical Node.js package structure where core functionality resides in index.js