{"id":"CVE-2022-24440","details":"The package cocoapods-downloader before 1.6.0, from 1.6.2 and before 1.6.3 are vulnerable to Command Injection via git argument injection. When calling the Pod::Downloader.preprocess_options function and using git, both the git and branch parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.","aliases":["GHSA-7627-mp87-jf6q"],"modified":"2026-04-10T04:45:24.707241Z","published":"2022-04-01T18:15:08.767Z","related":["SNYK-RUBY-COCOAPODSDOWNLOADER-2414278"],"references":[{"type":"ADVISORY","url":"https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414278"},{"type":"FIX","url":"https://github.com/CocoaPods/cocoapods-downloader/pull/124"},{"type":"FIX","url":"https://github.com/CocoaPods/cocoapods-downloader/pull/128"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/cocoapods/cocoapods-downloader","events":[{"introduced":"0"},{"fixed":"e53d02304426c3f7b0f725371c8a5594cecf9be4"},{"introduced":"0"},{"last_affected":"591167a841c64ca1ae9a8b411c1d1bdffc3bf285"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.6.0"},{"introduced":"0"},{"last_affected":"1.6.2"}]}}],"versions":["0.1.0","0.1.1","0.1.2","0.2.0","0.3.0","0.4.0","0.4.1","0.5.0","0.6.0","0.6.1","0.7.2","0.8.0","0.8.1","0.9.0","0.9.1","0.9.2","0.9.3","1.0.0.beta.1","1.0.0.beta.2","1.0.0.beta.3","1.0.0.rc.1","1.1.2","1.1.3","1.2.1","1.2.2","1.4.0","1.6.0","1.6.1","1.6.2","v0.7.0","v0.7.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-24440.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}