fix: upgrade simple-git to 3.36.0 to address CVE-2026-6951#1183
Merged
brendan-kellam merged 4 commits intomainfrom May 9, 2026
Merged
fix: upgrade simple-git to 3.36.0 to address CVE-2026-6951#1183brendan-kellam merged 4 commits intomainfrom
brendan-kellam merged 4 commits intomainfrom
Conversation
Fixes SOU-1032 Updates simple-git from 3.33.0 to 3.36.0 in both @sourcebot/backend and @sourcebot/web packages to patch a Remote Code Execution vulnerability where attackers could bypass the CVE-2022-25912 fix by using --config instead of -c flag. Code review confirmed that user-controlled inputs are already safely handled (passed as string arguments rather than in options objects), providing defense-in-depth alongside this upgrade. Co-authored-by: Brendan Kellam <brendan@sourcebot.dev>
Contributor
|
Caution Review failedThe pull request is closed. ℹ️ Recent review info⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: 📒 Files selected for processing (1)
WalkthroughThis PR updates the ChangesSecurity Dependency Upgrade
Estimated code review effort🎯 1 (Trivial) | ⏱️ ~3 minutes Suggested reviewers
🚥 Pre-merge checks | ✅ 5✅ Passed checks (5 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
This comment has been minimized.
This comment has been minimized.
Co-authored-by: Brendan Kellam <brendan@sourcebot.dev>
Contributor
License Audit
Weak Copyleft Packages (informational)
Resolved Packages (20)
|
Removed mention of RCE bypass in simple-git upgrade note.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Fixes SOU-1032
Summary
This PR upgrades
simple-gitfrom3.33.0to3.36.0in both the@sourcebot/backendand@sourcebot/webpackages to address CVE-2026-6951, a high-severity Remote Code Execution vulnerability.Vulnerability Details
The vulnerability allows attackers to bypass the previous fix for CVE-2022-25912 by using the
--configlong-form flag instead of the-cshort-form flag (which was already blocked). An attacker who can supply untrusted input to simple-git's options argument could:protocol.ext.allow=alwaysvia--configext::clone source to execute arbitrary shell commands via git's external protocol handlerThis results in full remote code execution on the server.
Changes
simple-gitdependency from^3.33.0to^3.36.0inpackages/backend/package.jsonsimple-gitdependency from^3.33.0to^3.36.0inpackages/web/package.jsonyarn.lockto reflect the new versionSecurity Review
I reviewed all usages of
simple-gitin the codebase and confirmed that:-are rejected to prevent flag injection-cflag is only used with hardcoded, safe configuration values (e.g.,core.quotePath=false,http.extraHeader)This upgrade provides defense-in-depth by closing the
--configbypass vector, even though our existing code patterns were not directly vulnerable.References
Linear Issue: SOU-1032
Summary by CodeRabbit