{ "schema_version": "1.4.0", "id": "GHSA-2w9p-xf5h-qwj3", "modified": "2023-03-28T23:17:20Z", "published": "2023-03-27T03:30:16Z", "withdrawn": "2023-03-28T23:17:20Z", "aliases": [], "summary": "Duplicate Advisory: pullit Command Injection vulnerability", "details": "## Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of [GHSA-8px5-63x9-5c7p](https://github.com/advisories/GHSA-8px5-63x9-5c7p). This link is maintained to preserve external references.\n\n## Original Description\nThe pullit package before 1.4.0 for Node.js allows OS Command Injection because `eval()` is used on an attacker-supplied Git branch name.", "severity": [], "affected": [ { "package": { "ecosystem": "npm", "name": "pullit" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" } ] } ], "database_specific": { "last_known_affected_version_range": "< 1.4.0" } } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-25083" }, { "type": "WEB", "url": "https://github.com/jkup/pullit/commit/4fec455774ee08f4dce0ef2ef934ffcc37219bfb" }, { "type": "PACKAGE", "url": "https://github.com/jkup/pullit" }, { "type": "WEB", "url": "https://security.snyk.io/vuln/npm:pullit:20180214" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-03-27T21:20:41Z", "nvd_published_at": "2023-03-27T03:15:00Z" } }