Untriaged
Permalink
CVE-2024-47516
9.8 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Pagure: argument injection in pagurerepo.log()
A vulnerability was found in Pagure. An argument injection in Git during retrieval of the repository history leads to remote code execution on the Pagure instance.
References
Affected products
pagure
- ==5.14.1
Matching in nixpkgs
pkgs.haskellPackages.pagure
Pagure REST client library
pkgs.haskellPackages.pagure-cli
Pagure client