Bug 2215317 (CVE-2022-21235)

Summary: CVE-2022-21235 github.com/Masterminds/vcs: Command Injection via argument injection
Product: [Other] Security Response Reporter: Marian Rehak <mrehak>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: adudiak, ahanwate, amasferr, amctagga, aveerama, chazlett, cwelton, davidn, dfreiber, dhughes, dperaza, dsimansk, eglynn, ellin, epacific, gparvin, jburrell, jcammara, jchui, jhardy, jjoyce, jneedle, jobarker, jschluet, kshier, lball, lgamliel, lhh, mabashia, matzew, mburns, mgarciac, mkudlej, mschuppe, muagarwa, nbecker, njean, osapryki, owatkins, pahickey, pgrist, rdey, rfreiman, rgarg, rhos-maint, rhuss, rogbas, sasakshi, scorneli, shbose, simaishi, skontopo, smcdonal, stcannon, teagle, tfister, tjochec, ubhargav, vkumar, vsroka, yguenane, zsadeh
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: github.com/masterminds/vcs 1.13.3 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the VCS package, caused by improper validation of user-supplied input. By using a specially-crafted argument, a remote attacker could execute arbitrary commands on the system.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2215329, 2215332, 2215479, 2215480, 2215481, 2215482, 2215483, 2215484, 2215485, 2215486, 2215487, 2215488, 2215489, 2215490, 2215491, 2215492, 2215493, 2216406, 2217526    
Bug Blocks: 2215338    

Description Marian Rehak 2023-06-15 14:09:08 UTC
The package github.com/masterminds/vcs before 1.13.3 are vulnerable to Command Injection via argument injection. When hg is executed, argument strings are passed to hg in a way that additional flags can be set. The additional flags can be used to perform a command injection.

Reference:

https://github.com/Masterminds/vcs/pull/105
https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMASTERMINDSVCS-2437078

Comment 1 Marian Rehak 2023-06-15 14:46:06 UTC
Created golang-github-Masterminds-vcs tracking bugs for this issue:

Affects: epel-7 [bug 2215329]

Comment 2 Marian Rehak 2023-06-15 14:50:03 UTC
Created glide tracking bugs for this issue:

Affects: epel-7 [bug 2215332]

Comment 13 errata-xmlrpc 2023-07-19 01:16:24 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.11

Via RHSA-2023:4053 https://access.redhat.com/errata/RHSA-2023:4053

Comment 14 sakshi 2023-07-21 00:49:03 UTC
The customer has an openshift environment (uses CoreOS and inplace Ceph) and just completed the environment upgrade to 4.10.59. On the standalone servers, the customer is running either RHEL8.8 or RHEL7.9.

The customer is impacted by vulnerability `CVE-2022-21235` and this bug .The customer wants to know when this bug will be fixed. Kindly assist.

Comment 15 sakshi 2023-07-24 07:29:23 UTC
Hi Team, Any timeline when this issue will be fixed?

Comment 16 sakshi 2023-07-31 01:31:33 UTC
Hi Team, Customer wants to know the timeline for when this issue will be fixed. Kindly assist. Thanks!

Comment 19 errata-xmlrpc 2023-08-16 00:19:48 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 17.1

Via RHSA-2023:4582 https://access.redhat.com/errata/RHSA-2023:4582

Comment 20 sakshi 2023-08-21 06:37:52 UTC
Hi Team, Customer uses CoreOS and in place Ceph) and just completed the environment upgrade to 4.10.59. On the standalone servers, the customer is running either RHEL8.8 or RHEL7.9.

The customer is impacted by vulnerability `CVE-2022-21235` and this bug. The customer wants to know when this bug will be fixed. The customer is waiting for the feedback for long time. Please assist.

Comment 21 errata-xmlrpc 2023-08-22 00:09:39 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 16.2

Via RHSA-2023:4694 https://access.redhat.com/errata/RHSA-2023:4694