Skip to content

CVE-2023-26143 | blamer

Versions of the package blamer before 1.0.4 are vulnerable to Arbitrary Argument Injection via the blameByFile() API. The library does not sanitize for user input or validate the given file path conforms to a specific schema, nor does it properly pass command-line flags to the git binary using the double-dash POSIX characters (–) to communicate the end of options..This CVE has a CVSS3.1 score of 6.5 and a Base Severity of MEDIUM.

InfoDetails
CVE IDCVE-2023-26143
CVE StatePUBLISHED
BaseScore6.5
BaseSeverityMEDIUM
VectorStringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:P
VersionNA

References for CVE-2023-26143 :
https://security.snyk.io/vuln/SNYK-JS-BLAMER-5731318
https://gist.github.com/lirantal/14c3686370a86461f555d3f0703e02f9
https://github.com/kucherenko/blamer/commit/0965877f115753371a2570f10a63c455d2b2cde3

Metric TypeMetric Score
AttackVector(AV)NETWORK
AttackComplexity(AC)LOW
PrivilegesRequired(PR)NONE
UserInteraction(UI)NONE
Scope(S)UNCHANGED
Confidentiality(C)NONE
Availability(A)LOW
Integrity(I)LOW