{"id":"CVE-2022-24439","details":"All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.","aliases":["GHSA-hcpj-qp55-gfph","PYSEC-2022-42992"],"modified":"2026-04-09T08:42:16.885909Z","published":"2022-12-06T05:15:11.420Z","related":["MGASA-2023-0001","openSUSE-SU-2024:12596-1","openSUSE-SU-2024:13510-1","openSUSE-SU-2025:14858-1"],"references":[{"type":"WEB","url":"https://github.com/gitpython-developers/GitPython/blob/bec61576ae75803bc4e60d8de7a629c194313d1c/git/repo/base.py%23L1249"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00030.html"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AV5DV7GBLMOZT7U3Q4TDOJO5R6G3V6GH/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IKMVYKLWX62UEYKAN64RUZMOIAMZM5JN/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PF6AXUTC5BO7L2SBJMCVKJSPKWY52I5R/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJHN3QUXPJIMM6SULIR3PR34UFWRAE7X/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202311-01"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00024.html"},{"type":"EVIDENCE","url":"https://security.snyk.io/vuln/SNYK-PYTHON-GITPYTHON-3113858"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gitpython-developers/gitpython","events":[{"introduced":"0"},{"fixed":"141cd651e459bff8919798b3ccf03dfa167757f6"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.1.30"}]}}],"versions":["0.1.4","0.1.4-pre","0.1.5","0.1.6","0.2.0-beta1","0.3.0-beta1","0.3.0-beta2","0.3.1-beta1","0.3.1-beta2","0.3.2","0.3.2-RC1","0.3.2.1","0.3.3","0.3.4","0.3.5","0.3.6","0.3.7","1.0.0","1.0.1","1.0.2","2.0.0","2.0.1","2.0.2","2.0.3","2.0.4","2.0.5","2.0.6","2.0.7","2.0.8","2.0.9","2.1.0","2.1.1","2.1.10","2.1.11","2.1.12","2.1.13","2.1.2","2.1.3","2.1.4","2.1.5","2.1.6","2.1.8","2.1.9","3.0.0","3.0.1","3.0.2","3.0.3","3.0.4","3.0.5","3.0.6","3.0.7","3.0.8","3.0.9","3.1.0","3.1.1","3.1.10","3.1.11","3.1.12","3.1.13","3.1.16","3.1.17","3.1.18","3.1.19","3.1.2","3.1.20","3.1.22","3.1.23","3.1.24","3.1.25","3.1.26","3.1.27","3.1.28","3.1.29","3.1.3","3.1.4","3.1.5","3.1.6","3.1.7","3.1.8","3.1.9","winerr_show"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-24439.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]},{"events":[{"introduced":"0"},{"last_affected":"38"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}