Command-injection flaw discovered in fast-git-clone (unsafe CLI args lead to arbitrary code execution)
The blog post describes a serious security vulnerability in fast-git-clone (a command-line tool for cloning Git repositories). The tool takes a repository URL from user input and builds a shell command by concatenating unfiltered arguments — this allows attackers to append arbitrary shell commands instead of just a repository URL. For example, running fgc clone "; touch /tmp/clonepwn #" would create a file /tmp/clonepwn, showing code execution beyond the intended git clone.
Because many users run CLI tools like fast-git-clone under usual privileges, this vulnerability allows any user with access to run the tool to execute malicious commands on their system. The disclosure notes that maintainers did not respond to repeated security-report attempts.
Comments
Post a Comment