cve-2022-31012
Vulnerability from cvelistv5
Published
2022-07-12 20:35
Modified
2024-08-03 07:03
Severity ?
EPSS score ?
Summary
Git for Windows' installer can be tricked into executing an untrusted binary
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/git-for-windows/git/releases/tag/v2.37.1.windows.1 | Release Notes, Third Party Advisory | |
security-advisories@github.com | https://github.com/git-for-windows/git/security/advisories/GHSA-gjrj-fxvp-hjj2 | Mitigation, Third Party Advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
git-for-windows | git |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.249Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-gjrj-fxvp-hjj2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/git-for-windows/git/releases/tag/v2.37.1.windows.1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "git", "vendor": "git-for-windows", "versions": [ { "status": "affected", "version": "\u003c 2.37.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Git for Windows is a fork of Git that contains Windows-specific patches. This vulnerability in versions prior to 2.37.1 lets Git for Windows\u0027 installer execute a binary into `C:\\mingw64\\bin\\git.exe` by mistake. This only happens upon a fresh install, not when upgrading Git for Windows. A patch is included in version 2.37.1. Two workarounds are available. Create the `C:\\mingw64` folder and remove read/write access from this folder, or disallow arbitrary authenticated users to create folders in `C:\\`." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-426", "description": "CWE-426: Untrusted Search Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-12T20:35:15", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-gjrj-fxvp-hjj2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/git-for-windows/git/releases/tag/v2.37.1.windows.1" } ], "source": { "advisory": "GHSA-gjrj-fxvp-hjj2", "discovery": "UNKNOWN" }, "title": "Git for Windows\u0027 installer can be tricked into executing an untrusted binary", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31012", "STATE": "PUBLIC", "TITLE": "Git for Windows\u0027 installer can be tricked into executing an untrusted binary" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "git", "version": { "version_data": [ { "version_value": "\u003c 2.37.1" } ] } } ] }, "vendor_name": "git-for-windows" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Git for Windows is a fork of Git that contains Windows-specific patches. This vulnerability in versions prior to 2.37.1 lets Git for Windows\u0027 installer execute a binary into `C:\\mingw64\\bin\\git.exe` by mistake. This only happens upon a fresh install, not when upgrading Git for Windows. A patch is included in version 2.37.1. Two workarounds are available. Create the `C:\\mingw64` folder and remove read/write access from this folder, or disallow arbitrary authenticated users to create folders in `C:\\`." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-426: Untrusted Search Path" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/git-for-windows/git/security/advisories/GHSA-gjrj-fxvp-hjj2", "refsource": "CONFIRM", "url": "https://github.com/git-for-windows/git/security/advisories/GHSA-gjrj-fxvp-hjj2" }, { "name": "https://github.com/git-for-windows/git/releases/tag/v2.37.1.windows.1", "refsource": "MISC", "url": "https://github.com/git-for-windows/git/releases/tag/v2.37.1.windows.1" } ] }, "source": { "advisory": "GHSA-gjrj-fxvp-hjj2", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31012", "datePublished": "2022-07-12T20:35:15", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T07:03:40.249Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-31012\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-07-12T21:15:09.843\",\"lastModified\":\"2022-07-22T16:50:20.247\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Git for Windows is a fork of Git that contains Windows-specific patches. This vulnerability in versions prior to 2.37.1 lets Git for Windows\u0027 installer execute a binary into `C:\\\\mingw64\\\\bin\\\\git.exe` by mistake. This only happens upon a fresh install, not when upgrading Git for Windows. A patch is included in version 2.37.1. Two workarounds are available. Create the `C:\\\\mingw64` folder and remove read/write access from this folder, or disallow arbitrary authenticated users to create folders in `C:\\\\`.\"},{\"lang\":\"es\",\"value\":\"Git para Windows es un fork de Git que contiene parches espec\u00edficos para Windows. Esta vulnerabilidad en versiones anteriores a 2.37.1 permite al instalador de Git para Windows ejecutar un binario en \\\"C:\\\\mingw64\\\\bin\\\\git.exe\\\" por error. Esto s\u00f3lo ocurre en una instalaci\u00f3n nueva, no cuando se actualiza Git para Windows. Es incluido un parche en versi\u00f3n 2.37.1. Se presentan dos mitigaciones disponibles. Cree la carpeta \\\"C:\\\\mingw64\\\" y elimine el acceso de lectura/escritura de esta carpeta, o no permita a usuarios autenticados arbitrariamente crear carpetas en \\\"C:\\\\\\\"\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.3,\"impactScore\":5.9},{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.5,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:P/A:P\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":4.4},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-426\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gitforwindows:git:*:*:*:*:*:windows:*:*\",\"versionEndExcluding\":\"2.37.1\",\"matchCriteriaId\":\"0BCD9779-EB13-4F24-B0CB-C744E348C3E2\"}]}]}],\"references\":[{\"url\":\"https://github.com/git-for-windows/git/releases/tag/v2.37.1.windows.1\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/git-for-windows/git/security/advisories/GHSA-gjrj-fxvp-hjj2\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.