Misinterpretation of Input Affecting @finos/git-proxy package, versions <1.19.2


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-FINOSGITPROXY-11344799
  • published31 Jul 2025
  • disclosed30 Jul 2025
  • creditUnknown

Introduced: 30 Jul 2025

NewCVE-2025-54584  (opens in a new tab)
CWE-115  (opens in a new tab)

How to fix?

Upgrade @finos/git-proxy to version 1.19.2 or higher.

Overview

@finos/git-proxy is a Deploy custom push protections and policies on top of Git.

Affected versions of this package are vulnerable to Misinterpretation of Input via the parsePush.ts file. An attacker can bypass approval mechanisms or hide commits by crafting a malicious Git packfile that embeds a misleading PACK signature within commit content and manipulates the packet structure to deceive the parser.

PoC

  1. Create a commit on any branch containing the string "PACK".
  2. Use git pack-objects or a low-level library/custom script and add the string "PACK" after the real packfile's PACK header in the binary stream to generate a custom packfile with both branches.
  3. Push using a custom client/raw protocol injection

CVSS Base Scores

version 4.0
version 3.1