Command-injection flaw discovered in fast-git-clone (unsafe CLI args lead to arbitrary code execution)

The blog post describes a serious security vulnerability in fast-git-clone (a command-line tool for cloning Git repositories). The tool takes a repository URL from user input and builds a shell command by concatenating unfiltered arguments — this allows attackers to append arbitrary shell commands instead of just a repository URL. For example, running fgc clone "; touch /tmp/clonepwn #" would create a file /tmp/clonepwn, showing code execution beyond the intended git clone.

Because many users run CLI tools like fast-git-clone under usual privileges, this vulnerability allows any user with access to run the tool to execute malicious commands on their system. The disclosure notes that maintainers did not respond to repeated security-report attempts.

https://www.nodejs-security.com/blog/command-injection-vulnerability-via-unsanitized-cli-arguments-in-touxing-fast-git-clone/

Comments

Popular posts from this blog

Prompt Engineering Demands Rigorous Evaluation

Secure Vibe Coding Guide: Best Practices for Writing Secure Code

KEVIntel: Real-Time Intelligence on Exploited Vulnerabilities