DirectorySecurity Advisories
Sign In
Security Advisories

CGA-7739-w2fq-74jc

Published

Last updated

https://images.chainguard.dev/security/CGA-7739-w2fq-74jc
Package

gitlab-rails-ee-fips-17.7

Latest Update
Fixed
Fixed Version

17.7.2-r0

Aliases
  • CVE-2025-21613
  • GHSA-v725-9546-7q7m

Severity

9.8

Critical

CVSS V3

Summary

go-git has an Argument Injection via the URL field

Description

Impact

An argument injection vulnerability was discovered in go-git versions prior to v5.13.

Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags. This only happens when the file transport protocol is being used, as that is the only protocol that shells out to git binaries.

Affected versions

Users running versions of go-git from v4 and above are recommended to upgrade to v5.13 in order to mitigate this vulnerability.

Workarounds

In cases where a bump to the latest version of go-git is not possible, we recommend users to enforce restrict validation rules for values passed in the URL field.

Credit

Thanks to @vin01 for responsibly disclosing this vulnerability to us.

References

Updates


Safe Source for Open Sourceâ„¢
Media KitContact Us
© 2024 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard Images