Description
The package weblate from 0 and before 4.11.1 are vulnerable to Remote Code Execution (RCE) via argument injection when using git or mercurial repositories. Authenticated users, can change the behavior of the application in an unintended way, leading to command execution.
References
https://github.com/WeblateOrg/weblate/pull/7337
https://github.com/WeblateOrg/weblate/pull/7338
https://github.com/WeblateOrg/weblate/releases/tag/weblate-4.11.1
https://snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088
https://github.com/WeblateOrg/weblate/pull/7337
https://github.com/WeblateOrg/weblate/pull/7338
https://github.com/WeblateOrg/weblate/releases/tag/weblate-4.11.1
https://snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 · High
Information
Source identifier
Vulnerability status
Modified
Published
2022-03-04T19:15:07.757Z
4 years agoLast modified
2024-11-21T05:49:27.273Z
1 year ago