CVE-2021-28954

In Chris Walz bit before 1.0.5 on Windows, attackers can run arbitrary code via a .exe file in a crafted repository.
References
Link Resource
https://github.com/chriswalz/bit/releases/tag/v1.0.5 Release Notes Third Party Advisory
https://vuln.ryotak.me/advisories/17 Third Party Advisory
https://github.com/chriswalz/bit/releases/tag/v1.0.5 Release Notes Third Party Advisory
https://vuln.ryotak.me/advisories/17 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:bit_project:bit:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:00

Type Values Removed Values Added
References () https://github.com/chriswalz/bit/releases/tag/v1.0.5 - Release Notes, Third Party Advisory () https://github.com/chriswalz/bit/releases/tag/v1.0.5 - Release Notes, Third Party Advisory
References () https://vuln.ryotak.me/advisories/17 - Third Party Advisory () https://vuln.ryotak.me/advisories/17 - Third Party Advisory

20 May 2022, 20:33

Type Values Removed Values Added
References (MISC) https://vuln.ryotak.me/advisories/17 - (MISC) https://vuln.ryotak.me/advisories/17 - Third Party Advisory
CWE CWE-427

03 May 2022, 16:04

Type Values Removed Values Added
CWE CWE-94 CWE-427

Information

Published : 2021-03-21 05:15

Updated : 2024-11-21 06:00


NVD link : CVE-2021-28954

Mitre link : CVE-2021-28954

CVE.ORG link : CVE-2021-28954


JSON object : View

Products Affected

microsoft

  • windows

bit_project

  • bit
CWE
CWE-427

Uncontrolled Search Path Element