x/vulndb: add reports/GO-2022-0414.yaml for CVE-2022-21235
Fixes golang/vulndb#0414
Change-Id: I39825d545365d21db9f89006035d91bad93842e4
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/414816
TryBot-Result: Gopher Robot <gobot@golang.org>
Run-TryBot: Damien Neil <dneil@google.com>
Reviewed-by: Tatiana Bradley <tatiana@golang.org>
diff --git a/reports/GO-2022-0414.yaml b/reports/GO-2022-0414.yaml
new file mode 100644
index 0000000..269e67b
--- /dev/null
+++ b/reports/GO-2022-0414.yaml
@@ -0,0 +1,38 @@
+packages:
+ - module: github.com/Masterminds/vcs
+ symbols:
+ - BzrRepo.Get
+ - BzrRepo.Init
+ - BzrRepo.Ping
+ - BzrRepo.ExportDir
+ - GitRepo.Get
+ - GitRepo.Init
+ - GitRepo.Update
+ - HgRepo.Get
+ - HgRepo.Init
+ - HgRepo.Ping
+ - HgRepo.ExportDir
+ - NewSvnRepo
+ - SvnRepo.Get
+ - SvnRepo.Ping
+ - SvnRepo.ExportDir
+ derived_symbols:
+ - NewRepo
+ versions:
+ - fixed: 1.13.3
+ vulnerable_at: 1.13.1
+description: |
+ Passing untrusted inputs to VCS functions can permit an attacker
+ to execute arbitrary commands.
+
+ The vcs package executes version control commands with
+ user-provided arguments. These arguments can be interpreted
+ as command-line flags, which can be used to perform command
+ injection.
+cves:
+ - CVE-2022-21235
+ghsas:
+ - GHSA-6635-c626-vj4r
+credit: Alessio Della Libera of Snyk Research Team
+links:
+ pr: https://github.com/Masterminds/vcs/pull/105