← Retour aux CVEs
CVE-2025-50178
N/ADescription
GitForge.jl is a unified interface for interacting with Git "forges." Versions prior to 0.4.3 lack input validation for user provided values in certain functions. In the `GitForge.get_repo` function for GitHub, the user can provide any string for the owner and repo fields. These inputs are not validated or safely encoded and are sent directly to the server. This means a user can add path traversal patterns like `../` in the input to access any other endpoints on api.github.com that were not intended. Version 0.4.3 contains a patch for the issue. No known workarounds are available.
Details CVE
Score CVSS v3.1N/A
Publie6/25/2025
Derniere modification6/26/2025
Sourcenvd
Observations honeypot0
Faiblesses (CWE)
CWE-20CWE-22
References
https://github.com/JuliaWeb/GitForge.jl/pull/50(security-advisories@github.com)
https://github.com/JuliaWeb/GitForge.jl/security/advisories/GHSA-g2xx-229f-3qjm(security-advisories@github.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.