| - module: github.com/git-lfs/git-lfs |
| - fixed: 1.5.1-0.20210113180018-fc664697ed2c |
| vulnerable_at: 1.5.1-0.20201211195948-e896fc7af7db |
| - package: github.com/git-lfs/git-lfs/commands |
| - singleCheckout.RunToPath |
| - uploadContext.UploadPointers |
| - package: github.com/git-lfs/git-lfs/creds |
| - AskPassCredentialHelper.getFromProgram |
| - commandCredentialHelper.Approve |
| - AskPassCredentialHelper.Fill |
| - CredentialHelperWrapper.FillCreds |
| - CredentialHelpers.Approve |
| - package: github.com/git-lfs/git-lfs/lfs |
| - package: github.com/git-lfs/git-lfs/lfshttp |
| summary: Arbitrary code execution on Windows in github.com/git-lfs/git-lfs |
| Due to the standard library behavior of exec.LookPath on Windows a number of |
| methods may result in arbitrary code execution when cloning or operating on |
| untrusted Git repositories. |
| published: 2021-04-14T20:04:52Z |
| - fix: https://github.com/git-lfs/git-lfs/commit/fc664697ed2c2081ee9633010de0a7f9debea72a |