Untriaged
Permalink
CVE-2024-47516
9.8 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Pagure: argument injection in pagurerepo.log()
A vulnerability was found in Pagure. An argument injection in Git during retrieval of the repository history leads to remote code execution on the Pagure instance.
References
- https://access.redhat.com/security/cve/CVE-2024-47516 x_refsource_REDHAT vdb-entry
- RHBZ#2315805 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-47516 x_refsource_REDHAT vdb-entry
- RHBZ#2315805 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-47516 x_refsource_REDHAT vdb-entry
- RHBZ#2315805 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-47516 x_refsource_REDHAT vdb-entry
- RHBZ#2315805 issue-tracking x_refsource_REDHAT
Affected products
pagure
- ==5.14.1
Matching in nixpkgs
pkgs.haskellPackages.pagure
Pagure REST client library
-
nixos-unstable -
- nixpkgs-unstable 0.2.1
pkgs.haskellPackages.pagure-cli
A Pagure gitforge query tool
-
nixos-unstable -
- nixpkgs-unstable 0.2.2