CVE-2022-41942

Sourcegraph is a code intelligence platform. In versions prior to 4.1.0 a command Injection vulnerability existed in the gitserver service, present in all Sourcegraph deployments. This vulnerability was caused by a lack of input validation on the host parameter of the `/list-gitolite` endpoint. It was possible to send a crafted request to gitserver that would execute commands inside the container. Successful exploitation requires the ability to send local requests to gitserver. The issue is patched in version 4.1.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sourcegraph:sourcegraph:*:*:*:*:*:*:*:*

History

26 Nov 2022, 03:30

Type Values Removed Values Added
CPE cpe:2.3:a:sourcegraph:sourcegraph:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Sourcegraph sourcegraph
Sourcegraph
References (CONFIRM) https://github.com/sourcegraph/sourcegraph/security/advisories/GHSA-pfm3-23mh-6xjp - (CONFIRM) https://github.com/sourcegraph/sourcegraph/security/advisories/GHSA-pfm3-23mh-6xjp - Third Party Advisory
References (MISC) https://github.com/sourcegraph/sourcegraph/pull/42553 - (MISC) https://github.com/sourcegraph/sourcegraph/pull/42553 - Patch, Third Party Advisory

22 Nov 2022, 19:17

Type Values Removed Values Added
New CVE

Information

Published : 2022-11-22 19:15

Updated : 2023-12-10 14:48


NVD link : CVE-2022-41942

Mitre link : CVE-2022-41942

CVE.ORG link : CVE-2022-41942


JSON object : View

Products Affected

sourcegraph

  • sourcegraph
CWE
CWE-20

Improper Input Validation

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')