Powerline Gitstatus vulnerable to arbitrary code execution
High severity
GitHub Reviewed
Published
Oct 13, 2022
to the GitHub Advisory Database
•
Updated Sep 4, 2023
Description
Published by the National Vulnerability Database
Oct 13, 2022
Published to the GitHub Advisory Database
Oct 13, 2022
Reviewed
Oct 13, 2022
Last updated
Sep 4, 2023
powerline-gitstatus (aka Powerline Gitstatus) before 1.3.2 allows arbitrary code execution. git repositories can contain per-repository configuration that changes the behavior of git, including running arbitrary commands. When using powerline-gitstatus, changing to a directory automatically runs git commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory to one controlled by the attacker, such as in a shared filesystem or extracted archive, powerline-gitstatus will run arbitrary commands under the attacker's control. NOTE: this is similar to CVE-2022-20001.
References