Vulnerability Details CVE-2022-21187
The package libvcs before 0.11.1 are vulnerable to Command Injection via argument injection. When calling the update_repo function (when using hg), the url parameter is passed to the hg clone command. By injecting some hg options it was possible to get arbitrary command execution.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.007
EPSS Ranking 71.8%
CVSS Severity
CVSS v3 Score 8.1
CVSS v2 Score 7.5
Products affected by CVE-2022-21187
-
cpe:2.3:a:libvcs_project:libvcs:0.1.0
-
cpe:2.3:a:libvcs_project:libvcs:0.1.1
-
cpe:2.3:a:libvcs_project:libvcs:0.1.2
-
cpe:2.3:a:libvcs_project:libvcs:0.1.3
-
cpe:2.3:a:libvcs_project:libvcs:0.1.4
-
cpe:2.3:a:libvcs_project:libvcs:0.1.5
-
cpe:2.3:a:libvcs_project:libvcs:0.1.6
-
cpe:2.3:a:libvcs_project:libvcs:0.1.7
-
cpe:2.3:a:libvcs_project:libvcs:0.10.0
-
cpe:2.3:a:libvcs_project:libvcs:0.10.1
-
cpe:2.3:a:libvcs_project:libvcs:0.11.0
-
cpe:2.3:a:libvcs_project:libvcs:0.2.0
-
cpe:2.3:a:libvcs_project:libvcs:0.2.1
-
cpe:2.3:a:libvcs_project:libvcs:0.2.2
-
cpe:2.3:a:libvcs_project:libvcs:0.2.3
-
cpe:2.3:a:libvcs_project:libvcs:0.3.0
-
cpe:2.3:a:libvcs_project:libvcs:0.3.1
-
cpe:2.3:a:libvcs_project:libvcs:0.3.2
-
cpe:2.3:a:libvcs_project:libvcs:0.3.3
-
cpe:2.3:a:libvcs_project:libvcs:0.4.0
-
cpe:2.3:a:libvcs_project:libvcs:0.4.2
-
cpe:2.3:a:libvcs_project:libvcs:0.4.3
-
cpe:2.3:a:libvcs_project:libvcs:0.4.4
-
cpe:2.3:a:libvcs_project:libvcs:0.5.0
-
cpe:2.3:a:libvcs_project:libvcs:0.9.0