All the vulnerabilites related to git-for-windows - git
cve-2022-24765
Vulnerability from cvelistv5
Published
2022-04-12 00:00
Modified
2024-08-03 04:20
Severity ?
EPSS score ?
Summary
Uncontrolled search for the Git directory in Git for Windows
References
Impacted products
▼ | Vendor | Product |
---|---|---|
git-for-windows | git |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:50.377Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2" }, { "tags": [ "x_transferred" ], "url": "https://git-scm.com/book/en/v2/Appendix-A%3A-Git-in-Other-Environments-Git-in-Bash" }, { "tags": [ "x_transferred" ], "url": "https://git-scm.com/docs/git#Documentation/git.txt-codeGITCEILINGDIRECTORIEScode" }, { "name": "[oss-security] 20220412 git v2.35.2 and friends for CVE-2022-24765", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/04/12/7" }, { "name": "FEDORA-2022-e99ae504f5", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5PTN5NYEHYN2OQSHSAMCNICZNK2U4QH6/" }, { "name": "FEDORA-2022-3759ebabd2", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BENQYTDGUL6TF3UALY6GSIEXIHUIYNWM/" }, { "name": "FEDORA-2022-2fec5f30be", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SLP42KIZ6HACTVZMZLJLFJQ4W2XYT27M/" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT213261" }, { "name": "20220516 APPLE-SA-2022-05-16-8 Xcode 13.4", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2022/May/31" }, { "name": "FEDORA-2022-dfd7e7fc0e", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRZG5CDUQ27OWTPC5MQOR4UASNXHWEZS/" }, { "name": "FEDORA-2022-2a5de7cb8b", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDI325LOO2XBDDKLINOAQJEG6MHAURZE/" }, { "name": "[debian-lts-announce] 20221213 [SECURITY] [DLA 3239-1] git security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html" }, { "name": "FEDORA-2023-470c7ea49e", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DIKWISWUDFT2FAITYIA6372BVLH3OOOC/" }, { "name": "FEDORA-2023-e3c8abd37e", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YROCMBWYFKRSS64PO6FUNM6L7LKBUKVW/" }, { "name": "FEDORA-2023-1068309389", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVOLER2PIGMHPQMDGG4RDE2KZB74QLA2/" }, { "name": "FEDORA-2023-3ec32f6d4e", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDZRZAL7QULOB6V7MKT66MOMWJLBJPX4/" }, { "name": "GLSA-202312-15", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202312-15" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "git", "vendor": "git-for-windows", "versions": [ { "status": "affected", "version": "\u003c 2.35.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\\.git\\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access from those folders as a workaround. Alternatively, define or extend `GIT_CEILING_DIRECTORIES` to cover the _parent_ directory of the user profile, e.g. `C:\\Users` if the user profile is located in `C:\\Users\\my-user-name`." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427: Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-27T10:06:30.486675", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2" }, { "url": "https://git-scm.com/book/en/v2/Appendix-A%3A-Git-in-Other-Environments-Git-in-Bash" }, { "url": "https://git-scm.com/docs/git#Documentation/git.txt-codeGITCEILINGDIRECTORIEScode" }, { "name": "[oss-security] 20220412 git v2.35.2 and friends for CVE-2022-24765", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/04/12/7" }, { "name": "FEDORA-2022-e99ae504f5", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5PTN5NYEHYN2OQSHSAMCNICZNK2U4QH6/" }, { "name": "FEDORA-2022-3759ebabd2", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BENQYTDGUL6TF3UALY6GSIEXIHUIYNWM/" }, { "name": "FEDORA-2022-2fec5f30be", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SLP42KIZ6HACTVZMZLJLFJQ4W2XYT27M/" }, { "url": "https://support.apple.com/kb/HT213261" }, { "name": "20220516 APPLE-SA-2022-05-16-8 Xcode 13.4", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2022/May/31" }, { "name": "FEDORA-2022-dfd7e7fc0e", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRZG5CDUQ27OWTPC5MQOR4UASNXHWEZS/" }, { "name": "FEDORA-2022-2a5de7cb8b", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDI325LOO2XBDDKLINOAQJEG6MHAURZE/" }, { "name": "[debian-lts-announce] 20221213 [SECURITY] [DLA 3239-1] git security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html" }, { "name": "FEDORA-2023-470c7ea49e", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DIKWISWUDFT2FAITYIA6372BVLH3OOOC/" }, { "name": "FEDORA-2023-e3c8abd37e", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YROCMBWYFKRSS64PO6FUNM6L7LKBUKVW/" }, { "name": "FEDORA-2023-1068309389", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVOLER2PIGMHPQMDGG4RDE2KZB74QLA2/" }, { "name": "FEDORA-2023-3ec32f6d4e", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDZRZAL7QULOB6V7MKT66MOMWJLBJPX4/" }, { "name": "GLSA-202312-15", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202312-15" } ], "source": { "advisory": "GHSA-vw2c-22j4-2fh2", "discovery": "UNKNOWN" }, "title": "Uncontrolled search for the Git directory in Git for Windows" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24765", "datePublished": "2022-04-12T00:00:00", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:20:50.377Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-29011
Vulnerability from cvelistv5
Published
2023-04-25 20:40
Modified
2024-08-02 14:00
Severity ?
EPSS score ?
Summary
Git for Windows's config file of `connect.exe` is susceptible to malicious placing
References
▼ | URL | Tags |
---|---|---|
https://github.com/git-for-windows/git/security/advisories/GHSA-g4fv-xjqw-q7jm | x_refsource_CONFIRM | |
https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
git-for-windows | git |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:00:14.373Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/git-for-windows/git/security/advisories/GHSA-g4fv-xjqw-q7jm", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-g4fv-xjqw-q7jm" }, { "name": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "git", "vendor": "git-for-windows", "versions": [ { "status": "affected", "version": "\u003c 2.40.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Git for Windows, the Windows port of Git, ships with an executable called `connect.exe`, which implements a SOCKS5 proxy that can be used to connect e.g. to SSH servers via proxies when certain ports are blocked for outgoing connections. The location of `connect.exe`\u0027s config file is hard-coded as `/etc/connectrc` which will typically be interpreted as `C:\\etc\\connectrc`. Since `C:\\etc` can be created by any authenticated user, this makes `connect.exe` susceptible to malicious files being placed there by other users on the same multi-user machine. The problem has been patched in Git for Windows v2.40.1. As a workaround, create the folder `etc` on all drives where Git commands are run, and remove read/write access from those folders. Alternatively, watch out for malicious `\u003cdrive\u003e:\\etc\\connectrc` files on multi-user machines." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427: Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-25T20:40:30.247Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/git-for-windows/git/security/advisories/GHSA-g4fv-xjqw-q7jm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-g4fv-xjqw-q7jm" }, { "name": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1" } ], "source": { "advisory": "GHSA-g4fv-xjqw-q7jm", "discovery": "UNKNOWN" }, "title": "Git for Windows\u0027s config file of `connect.exe` is susceptible to malicious placing" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-29011", "datePublished": "2023-04-25T20:40:30.247Z", "dateReserved": "2023-03-29T17:39:16.143Z", "dateUpdated": "2024-08-02T14:00:14.373Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31012
Vulnerability from cvelistv5
Published
2022-07-12 20:35
Modified
2024-08-03 07:03
Severity ?
EPSS score ?
Summary
Git for Windows' installer can be tricked into executing an untrusted binary
References
▼ | URL | Tags |
---|---|---|
https://github.com/git-for-windows/git/security/advisories/GHSA-gjrj-fxvp-hjj2 | x_refsource_CONFIRM | |
https://github.com/git-for-windows/git/releases/tag/v2.37.1.windows.1 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
git-for-windows | git |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.249Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-gjrj-fxvp-hjj2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/git-for-windows/git/releases/tag/v2.37.1.windows.1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "git", "vendor": "git-for-windows", "versions": [ { "status": "affected", "version": "\u003c 2.37.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Git for Windows is a fork of Git that contains Windows-specific patches. This vulnerability in versions prior to 2.37.1 lets Git for Windows\u0027 installer execute a binary into `C:\\mingw64\\bin\\git.exe` by mistake. This only happens upon a fresh install, not when upgrading Git for Windows. A patch is included in version 2.37.1. Two workarounds are available. Create the `C:\\mingw64` folder and remove read/write access from this folder, or disallow arbitrary authenticated users to create folders in `C:\\`." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-426", "description": "CWE-426: Untrusted Search Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-12T20:35:15", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-gjrj-fxvp-hjj2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/git-for-windows/git/releases/tag/v2.37.1.windows.1" } ], "source": { "advisory": "GHSA-gjrj-fxvp-hjj2", "discovery": "UNKNOWN" }, "title": "Git for Windows\u0027 installer can be tricked into executing an untrusted binary", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31012", "STATE": "PUBLIC", "TITLE": "Git for Windows\u0027 installer can be tricked into executing an untrusted binary" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "git", "version": { "version_data": [ { "version_value": "\u003c 2.37.1" } ] } } ] }, "vendor_name": "git-for-windows" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Git for Windows is a fork of Git that contains Windows-specific patches. This vulnerability in versions prior to 2.37.1 lets Git for Windows\u0027 installer execute a binary into `C:\\mingw64\\bin\\git.exe` by mistake. This only happens upon a fresh install, not when upgrading Git for Windows. A patch is included in version 2.37.1. Two workarounds are available. Create the `C:\\mingw64` folder and remove read/write access from this folder, or disallow arbitrary authenticated users to create folders in `C:\\`." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-426: Untrusted Search Path" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/git-for-windows/git/security/advisories/GHSA-gjrj-fxvp-hjj2", "refsource": "CONFIRM", "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-gjrj-fxvp-hjj2" }, { "name": "https://github.com/git-for-windows/git/releases/tag/v2.37.1.windows.1", "refsource": "MISC", "url": "https://github.com/git-for-windows/git/releases/tag/v2.37.1.windows.1" } ] }, "source": { "advisory": "GHSA-gjrj-fxvp-hjj2", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31012", "datePublished": "2022-07-12T20:35:15", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T07:03:40.249Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-29012
Vulnerability from cvelistv5
Published
2023-04-25 20:44
Modified
2024-08-02 14:00
Severity ?
EPSS score ?
Summary
Git CMD erroneously executes `doskey.exe` in the current directory, if it exists
References
▼ | URL | Tags |
---|---|---|
https://github.com/git-for-windows/git/security/advisories/GHSA-gq5x-v87v-8f7g | x_refsource_CONFIRM | |
https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
git-for-windows | git |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:00:14.358Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/git-for-windows/git/security/advisories/GHSA-gq5x-v87v-8f7g", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-gq5x-v87v-8f7g" }, { "name": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "git", "vendor": "git-for-windows", "versions": [ { "status": "affected", "version": "\u003c 2.40.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Git for Windows is the Windows port of Git. Prior to version 2.40.1, any user of Git CMD who starts the command in an untrusted directory is impacted by an Uncontrolles Search Path Element vulnerability. Maliciously-placed `doskey.exe` would be executed silently upon running Git CMD. The problem has been patched in Git for Windows v2.40.1. As a workaround, avoid using Git CMD or, if using Git CMD, avoid starting it in an untrusted directory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427: Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-25T20:44:05.329Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/git-for-windows/git/security/advisories/GHSA-gq5x-v87v-8f7g", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-gq5x-v87v-8f7g" }, { "name": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1" } ], "source": { "advisory": "GHSA-gq5x-v87v-8f7g", "discovery": "UNKNOWN" }, "title": "Git CMD erroneously executes `doskey.exe` in the current directory, if it exists" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-29012", "datePublished": "2023-04-25T20:44:05.329Z", "dateReserved": "2023-03-29T17:39:16.143Z", "dateUpdated": "2024-08-02T14:00:14.358Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-23618
Vulnerability from cvelistv5
Published
2023-02-14 20:38
Modified
2024-08-02 10:35
Severity ?
EPSS score ?
Summary
gitk can inadvertently call executables in the worktree
References
▼ | URL | Tags |
---|---|---|
https://github.com/git-for-windows/git/security/advisories/GHSA-wxwv-49qw-35pm | x_refsource_CONFIRM | |
https://github.com/git-for-windows/git/commit/49a8ec9dac3cec6602f05fed1b3f80a549c8c05c | x_refsource_MISC | |
https://github.com/git-for-windows/git/releases/tag/v2.39.2.windows.1 | x_refsource_MISC | |
https://wiki.tcl-lang.org/page/exec | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
git-for-windows | git |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:35:33.594Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/git-for-windows/git/security/advisories/GHSA-wxwv-49qw-35pm", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-wxwv-49qw-35pm" }, { "name": "https://github.com/git-for-windows/git/commit/49a8ec9dac3cec6602f05fed1b3f80a549c8c05c", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/git-for-windows/git/commit/49a8ec9dac3cec6602f05fed1b3f80a549c8c05c" }, { "name": "https://github.com/git-for-windows/git/releases/tag/v2.39.2.windows.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/git-for-windows/git/releases/tag/v2.39.2.windows.1" }, { "name": "https://wiki.tcl-lang.org/page/exec", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wiki.tcl-lang.org/page/exec" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "git", "vendor": "git-for-windows", "versions": [ { "status": "affected", "version": "\u003c 2.39.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Git for Windows is the Windows port of the revision control system Git. Prior to Git for Windows version 2.39.2, when `gitk` is run on Windows, it potentially runs executables from the current directory inadvertently, which can be exploited with some social engineering to trick users into running untrusted code. A patch is available in version 2.39.2. As a workaround, avoid using `gitk` (or Git GUI\u0027s \"Visualize History\" functionality) in clones of untrusted repositories.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-426", "description": "CWE-426: Untrusted Search Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-14T20:38:04.921Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/git-for-windows/git/security/advisories/GHSA-wxwv-49qw-35pm", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-wxwv-49qw-35pm" }, { "name": "https://github.com/git-for-windows/git/commit/49a8ec9dac3cec6602f05fed1b3f80a549c8c05c", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/git-for-windows/git/commit/49a8ec9dac3cec6602f05fed1b3f80a549c8c05c" }, { "name": "https://github.com/git-for-windows/git/releases/tag/v2.39.2.windows.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/git-for-windows/git/releases/tag/v2.39.2.windows.1" }, { "name": "https://wiki.tcl-lang.org/page/exec", "tags": [ "x_refsource_MISC" ], "url": "https://wiki.tcl-lang.org/page/exec" } ], "source": { "advisory": "GHSA-wxwv-49qw-35pm", "discovery": "UNKNOWN" }, "title": "gitk can inadvertently call executables in the worktree" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-23618", "datePublished": "2023-02-14T20:38:04.921Z", "dateReserved": "2023-01-16T17:07:46.243Z", "dateUpdated": "2024-08-02T10:35:33.594Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-25815
Vulnerability from cvelistv5
Published
2023-04-25 19:51
Modified
2024-08-02 11:32
Severity ?
EPSS score ?
Summary
Git looks for localized messages in the wrong place
References
Impacted products
▼ | Vendor | Product |
---|---|---|
git-for-windows | git |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:32:12.304Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8" }, { "name": "https://github.com/msys2/MINGW-packages/pull/10461", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/msys2/MINGW-packages/pull/10461" }, { "name": "https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack" }, { "name": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1" }, { "name": "https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/04/25/2" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202312-15" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "git", "vendor": "git-for-windows", "versions": [ { "status": "affected", "version": "\u003c 2.40.1" } ] } ], "descriptions": [ { "lang": "en", "value": "In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function\u0027s implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\\mingw64\\share\\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\\` (and since `C:\\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1.\n\nThis vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It does require local write access by the attacker, though, which makes this attack vector less likely. Version 2.40.1 contains a patch for this issue. Some workarounds are available. Do not work on a Windows machine with shared accounts, or alternatively create a `C:\\mingw64` folder and leave it empty. Users who have administrative rights may remove the permission to create folders in `C:\\`." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-134", "description": "CWE-134: Use of Externally-Controlled Format String", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-25T19:51:38.433Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-9w66-8mq8-5vm8" }, { "name": "https://github.com/msys2/MINGW-packages/pull/10461", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/msys2/MINGW-packages/pull/10461" }, { "name": "https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack", "tags": [ "x_refsource_MISC" ], "url": "https://axcheron.github.io/exploit-101-format-strings/#writing-to-the-stack" }, { "name": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1" }, { "name": "https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html", "tags": [ "x_refsource_MISC" ], "url": "https://pubs.opengroup.org/onlinepubs/9699919799/functions/printf.html" }, { "url": "http://www.openwall.com/lists/oss-security/2023/04/25/2" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/" }, { "url": "https://security.gentoo.org/glsa/202312-15" }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html" } ], "source": { "advisory": "GHSA-9w66-8mq8-5vm8", "discovery": "UNKNOWN" }, "title": "Git looks for localized messages in the wrong place" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-25815", "datePublished": "2023-04-25T19:51:38.433Z", "dateReserved": "2023-02-15T16:34:48.773Z", "dateUpdated": "2024-08-02T11:32:12.304Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22743
Vulnerability from cvelistv5
Published
2023-02-14 20:39
Modified
2024-08-02 10:20
Severity ?
EPSS score ?
Summary
Git for Windows' installer is susceptible to DLL side loading attacks
References
Impacted products
▼ | Vendor | Product |
---|---|---|
git-for-windows | git |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:30.039Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/git-for-windows/git/security/advisories/GHSA-p2x9-prp4-8gvq", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-p2x9-prp4-8gvq" }, { "name": "https://github.com/git-for-windows/git/security/advisories/GHSA-gf48-x3vr-j5c3", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-gf48-x3vr-j5c3" }, { "name": "https://attack.mitre.org/techniques/T1574/002/", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://attack.mitre.org/techniques/T1574/002/" }, { "name": "https://github.com/git-for-windows/git/releases/tag/v2.39.2.windows.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/git-for-windows/git/releases/tag/v2.39.2.windows.1" }, { "name": "https://learn.microsoft.com/en-us/windows/win32/controls/cookbook-overview?redirectedfrom=MSDN#using-comctl32dll-version-6-in-an-application-that-uses-only-standard-extensions", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://learn.microsoft.com/en-us/windows/win32/controls/cookbook-overview?redirectedfrom=MSDN#using-comctl32dll-version-6-in-an-application-that-uses-only-standard-extensions" }, { "name": "https://learn.microsoft.com/en-us/windows/win32/sbscs/about-side-by-side-assemblies-", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://learn.microsoft.com/en-us/windows/win32/sbscs/about-side-by-side-assemblies-" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "git", "vendor": "git-for-windows", "versions": [ { "status": "affected", "version": "\u003c 2.39.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Git for Windows is the Windows port of the revision control system Git. Prior to Git for Windows version 2.39.2, by carefully crafting DLL and putting into a subdirectory of a specific name living next to the Git for Windows installer, Windows can be tricked into side-loading said DLL. This potentially allows users with local write access to place malicious payloads in a location where automated upgrades might run the Git for Windows installer with elevation. Version 2.39.2 contains a patch for this issue. Some workarounds are available. Never leave untrusted files in the Downloads folder or its sub-folders before executing the Git for Windows installer, or move the installer into a different directory before executing it." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-426", "description": "CWE-426: Untrusted Search Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-14T20:39:30.094Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/git-for-windows/git/security/advisories/GHSA-p2x9-prp4-8gvq", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-p2x9-prp4-8gvq" }, { "name": "https://github.com/git-for-windows/git/security/advisories/GHSA-gf48-x3vr-j5c3", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-gf48-x3vr-j5c3" }, { "name": "https://attack.mitre.org/techniques/T1574/002/", "tags": [ "x_refsource_MISC" ], "url": "https://attack.mitre.org/techniques/T1574/002/" }, { "name": "https://github.com/git-for-windows/git/releases/tag/v2.39.2.windows.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/git-for-windows/git/releases/tag/v2.39.2.windows.1" }, { "name": "https://learn.microsoft.com/en-us/windows/win32/controls/cookbook-overview?redirectedfrom=MSDN#using-comctl32dll-version-6-in-an-application-that-uses-only-standard-extensions", "tags": [ "x_refsource_MISC" ], "url": "https://learn.microsoft.com/en-us/windows/win32/controls/cookbook-overview?redirectedfrom=MSDN#using-comctl32dll-version-6-in-an-application-that-uses-only-standard-extensions" }, { "name": "https://learn.microsoft.com/en-us/windows/win32/sbscs/about-side-by-side-assemblies-", "tags": [ "x_refsource_MISC" ], "url": "https://learn.microsoft.com/en-us/windows/win32/sbscs/about-side-by-side-assemblies-" } ], "source": { "advisory": "GHSA-p2x9-prp4-8gvq", "discovery": "UNKNOWN" }, "title": "Git for Windows\u0027 installer is susceptible to DLL side loading attacks" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-22743", "datePublished": "2023-02-14T20:39:30.094Z", "dateReserved": "2023-01-06T14:21:05.892Z", "dateUpdated": "2024-08-02T10:20:30.039Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41953
Vulnerability from cvelistv5
Published
2023-01-17 21:03
Modified
2024-08-03 12:56
Severity ?
EPSS score ?
Summary
Git clone remote code execution vulnerability in git-for-windows
References
▼ | URL | Tags |
---|---|---|
https://github.com/git-for-windows/git/security/advisories/GHSA-v4px-mx59-w99c | x_refsource_CONFIRM | |
https://github.com/git-for-windows/git/pull/4219 | x_refsource_MISC | |
https://github.com/git-for-windows/git/commit/7360767e8dfc1895a932324079f7d45d7791d39f | x_refsource_MISC | |
https://www.tcl.tk/man/tcl8.6/TclCmd/exec.html#M23 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
git-for-windows | git |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:56:38.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/git-for-windows/git/security/advisories/GHSA-v4px-mx59-w99c", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-v4px-mx59-w99c" }, { "name": "https://github.com/git-for-windows/git/pull/4219", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/git-for-windows/git/pull/4219" }, { "name": "https://github.com/git-for-windows/git/commit/7360767e8dfc1895a932324079f7d45d7791d39f", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/git-for-windows/git/commit/7360767e8dfc1895a932324079f7d45d7791d39f" }, { "name": "https://www.tcl.tk/man/tcl8.6/TclCmd/exec.html#M23", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tcl.tk/man/tcl8.6/TclCmd/exec.html#M23" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "git", "vendor": "git-for-windows", "versions": [ { "status": "affected", "version": "\u003c 2.39.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Git GUI is a convenient graphical tool that comes with Git for Windows. Its target audience is users who are uncomfortable with using Git on the command-line. Git GUI has a function to clone repositories. Immediately after the local clone is available, Git GUI will automatically post-process it, among other things running a spell checker called `aspell.exe` if it was found. Git GUI is implemented as a Tcl/Tk script. Due to the unfortunate design of Tcl on Windows, the search path when looking for an executable _always includes the current directory_. Therefore, malicious repositories can ship with an `aspell.exe` in their top-level directory which is executed by Git GUI without giving the user a chance to inspect it first, i.e. running untrusted code. This issue has been addressed in version 2.39.1. Users are advised to upgrade. Users unable to upgrade should avoid using Git GUI for cloning. If that is not a viable option, at least avoid cloning from untrusted sources." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-426", "description": "CWE-426: Untrusted Search Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-17T21:03:14.721Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/git-for-windows/git/security/advisories/GHSA-v4px-mx59-w99c", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-v4px-mx59-w99c" }, { "name": "https://github.com/git-for-windows/git/pull/4219", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/git-for-windows/git/pull/4219" }, { "name": "https://github.com/git-for-windows/git/commit/7360767e8dfc1895a932324079f7d45d7791d39f", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/git-for-windows/git/commit/7360767e8dfc1895a932324079f7d45d7791d39f" }, { "name": "https://www.tcl.tk/man/tcl8.6/TclCmd/exec.html#M23", "tags": [ "x_refsource_MISC" ], "url": "https://www.tcl.tk/man/tcl8.6/TclCmd/exec.html#M23" } ], "source": { "advisory": "GHSA-v4px-mx59-w99c", "discovery": "UNKNOWN" }, "title": "Git clone remote code execution vulnerability in git-for-windows" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-41953", "datePublished": "2023-01-17T21:03:14.721Z", "dateReserved": "2022-09-30T16:38:28.945Z", "dateUpdated": "2024-08-03T12:56:38.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }