PT-2022-16332 · Weblate · Weblate

Alessio Della Libera

·

Published

2022-03-04

·

Updated

2024-03-06

·

CVE-2022-23915

CVSS v3.1
8.8
VectorAV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions:

Weblate versions 0 through 4.11.1

Description:

The issue allows Remote Code Execution (RCE) via argument injection when using git or mercurial repositories. Authenticated users can change the behavior of the application in an unintended way, leading to command execution. Weblate didn't properly sanitize some arguments passed to Git and Mercurial, allowing them to change their behavior in an unintended way. Instances where untrusted users cannot create new components are not affected.

Recommendations:

For Weblate versions 0 through 4.11.1, update to version 4.11.1 or later to resolve the issue. As a temporary workaround, consider restricting access to instances where untrusted users can create new components to minimize the risk of exploitation.

Fix

Command Injection

Argument Injection

Weakness Enumeration

Related Identifiers

BIT-WEBLATE-2022-23915
CVE-2022-23915
GHSA-3872-F48P-PXQJ
GHSA-H2G5-2RHX-FFGJ
PYSEC-2022-162
PYSEC-2022-31
SNYK-PYTHON-WEBLATE-2414088

Affected Products

Weblate