gsd-2022-29187
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks.
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2022-29187",
    "description": "Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks.",
    "id": "GSD-2022-29187",
    "references": [
      "https://www.suse.com/security/cve/CVE-2022-29187.html",
      "https://ubuntu.com/security/CVE-2022-29187",
      "https://security.archlinux.org/CVE-2022-29187",
      "https://alas.aws.amazon.com/cve/html/CVE-2022-29187.html",
      "https://advisories.mageia.org/CVE-2022-29187.html"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2022-29187"
      ],
      "details": "Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks.",
      "id": "GSD-2022-29187",
      "modified": "2023-12-13T01:19:41.611184Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "security-advisories@github.com",
        "ID": "CVE-2022-29187",
        "STATE": "PUBLIC",
        "TITLE": "Bypass of safe.directory protections in Git"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "git",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "\u003e= 2.30.3, \u003c 2.30.5"
                        },
                        {
                          "version_value": "\u003e= 2.31.2, \u003c 2.31.4"
                        },
                        {
                          "version_value": "\u003e= 2.32.1, \u003c 2.32.3"
                        },
                        {
                          "version_value": "\u003e= 2.33.2, \u003c 2.33.4"
                        },
                        {
                          "version_value": "\u003e= 2.34.2, \u003c 2.34.4"
                        },
                        {
                          "version_value": "\u003e= 2.35.2, \u003c 2.35.4"
                        },
                        {
                          "version_value": "\u003e= 2.36, \u003c 2.36.2"
                        },
                        {
                          "version_value": "\u003e= 2.37, \u003c 2.37.1"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "git"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks."
          }
        ]
      },
      "impact": {
        "cvss": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        }
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "CWE-282: Improper Ownership Management"
              }
            ]
          },
          {
            "description": [
              {
                "lang": "eng",
                "value": "CWE-427: Uncontrolled Search Path Element"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://github.com/git/git/security/advisories/GHSA-j342-m5hw-rr3v",
            "refsource": "CONFIRM",
            "url": "https://github.com/git/git/security/advisories/GHSA-j342-m5hw-rr3v"
          },
          {
            "name": "https://github.blog/2022-04-12-git-security-vulnerability-announced",
            "refsource": "MISC",
            "url": "https://github.blog/2022-04-12-git-security-vulnerability-announced"
          },
          {
            "name": "https://lore.kernel.org/git/xmqqv8s2fefi.fsf@gitster.g/T/#u",
            "refsource": "MISC",
            "url": "https://lore.kernel.org/git/xmqqv8s2fefi.fsf@gitster.g/T/#u"
          },
          {
            "name": "[oss-security] 20220713 Git v2.37.1 and friends for CVE-2022-29187",
            "refsource": "MLIST",
            "url": "http://www.openwall.com/lists/oss-security/2022/07/14/1"
          },
          {
            "name": "FEDORA-2022-dfd7e7fc0e",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRZG5CDUQ27OWTPC5MQOR4UASNXHWEZS/"
          },
          {
            "name": "FEDORA-2022-2a5de7cb8b",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDI325LOO2XBDDKLINOAQJEG6MHAURZE/"
          },
          {
            "name": "https://support.apple.com/kb/HT213496",
            "refsource": "CONFIRM",
            "url": "https://support.apple.com/kb/HT213496"
          },
          {
            "name": "20221107 APPLE-SA-2022-11-01-1 Xcode 14.1",
            "refsource": "FULLDISC",
            "url": "http://seclists.org/fulldisclosure/2022/Nov/1"
          },
          {
            "name": "[debian-lts-announce] 20221213 [SECURITY] [DLA 3239-1] git security update",
            "refsource": "MLIST",
            "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html"
          },
          {
            "name": "FEDORA-2023-470c7ea49e",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIKWISWUDFT2FAITYIA6372BVLH3OOOC/"
          },
          {
            "name": "FEDORA-2023-e3c8abd37e",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YROCMBWYFKRSS64PO6FUNM6L7LKBUKVW/"
          },
          {
            "name": "FEDORA-2023-1068309389",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVOLER2PIGMHPQMDGG4RDE2KZB74QLA2/"
          },
          {
            "name": "FEDORA-2023-3ec32f6d4e",
            "refsource": "FEDORA",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDZRZAL7QULOB6V7MKT66MOMWJLBJPX4/"
          },
          {
            "name": "GLSA-202312-15",
            "refsource": "GENTOO",
            "url": "https://security.gentoo.org/glsa/202312-15"
          },
          {
            "name": "GLSA-202401-17",
            "refsource": "GENTOO",
            "url": "https://security.gentoo.org/glsa/202401-17"
          }
        ]
      },
      "source": {
        "advisory": "GHSA-j342-m5hw-rr3v",
        "discovery": "UNKNOWN"
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CF6F4F50-E470-445C-997D-AF8F00EA5DB2",
                    "versionEndExcluding": "2.30.5",
                    "versionStartIncluding": "2.30.3",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BD094817-F700-4F5C-9595-D763B959E9E9",
                    "versionEndExcluding": "2.31.4",
                    "versionStartIncluding": "2.31.2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "823D7473-2511-4C8E-AE94-C0341EC87507",
                    "versionEndExcluding": "2.32.3",
                    "versionStartIncluding": "2.32.1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2E1918C0-8038-433B-ABBE-842F1B280061",
                    "versionEndExcluding": "2.33.4",
                    "versionStartIncluding": "2.33.2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5F98C9BC-FA28-4ED6-8DAD-7FAE6EB00D83",
                    "versionEndExcluding": "2.34.4",
                    "versionStartIncluding": "2.34.2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F1AC0DD7-AB8F-4643-A392-282AE4AC04D6",
                    "versionEndExcluding": "2.35.4",
                    "versionStartIncluding": "2.35.2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D8C0EEA2-49DE-4D7A-807C-7872A471499E",
                    "versionEndExcluding": "2.36.2",
                    "versionStartIncluding": "2.36.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "175F385C-C0A1-490C-812C-F4F73F6D4A40",
                    "versionEndExcluding": "2.37.1",
                    "versionStartIncluding": "2.37.0",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
                    "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CECD39AA-41F4-4638-B59A-C5E928B585C3",
                    "versionEndExcluding": "14.1",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks."
          },
          {
            "lang": "es",
            "value": "Git es un sistema de control de revisi\u00f3n distribuido. Git versiones anteriores a 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4 y 2.30.5, es vulnerable a la escalada de privilegios en todas las plataformas. Un usuario desprevenido a\u00fan podr\u00eda verse afectado por el problema reportado en CVE-2022-24765, por ejemplo cuando navega como root en un directorio tmp compartido que es de su propiedad, pero donde un atacante podr\u00eda crear un repositorio git. Las versiones 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4 y 2.30.5 contienen un parche para este problema. La forma m\u00e1s sencilla de evitar ser afectado por la explotaci\u00f3n descrita en el ejemplo es evitar ejecutar git como root (o como administrador en Windows), y si es necesario reducir su uso al m\u00ednimo. Aunque no es posible una mitigaci\u00f3n gen\u00e9rica, un sistema puede ser reforzado contra la explotaci\u00f3n descrito en el ejemplo eliminando cualquier repositorio de este tipo si ya se presenta y creando uno como root para bloquear cualquier ataque futuro"
          }
        ],
        "id": "CVE-2022-29187",
        "lastModified": "2024-01-14T10:15:08.090",
        "metrics": {
          "cvssMetricV2": [
            {
              "acInsufInfo": false,
              "baseSeverity": "MEDIUM",
              "cvssData": {
                "accessComplexity": "MEDIUM",
                "accessVector": "LOCAL",
                "authentication": "NONE",
                "availabilityImpact": "COMPLETE",
                "baseScore": 6.9,
                "confidentialityImpact": "COMPLETE",
                "integrityImpact": "COMPLETE",
                "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
                "version": "2.0"
              },
              "exploitabilityScore": 3.4,
              "impactScore": 10.0,
              "obtainAllPrivilege": false,
              "obtainOtherPrivilege": false,
              "obtainUserPrivilege": false,
              "source": "nvd@nist.gov",
              "type": "Primary",
              "userInteractionRequired": false
            }
          ],
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "LOCAL",
                "availabilityImpact": "HIGH",
                "baseScore": 7.8,
                "baseSeverity": "HIGH",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "HIGH",
                "privilegesRequired": "LOW",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                "version": "3.1"
              },
              "exploitabilityScore": 1.8,
              "impactScore": 5.9,
              "source": "nvd@nist.gov",
              "type": "Primary"
            },
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "LOCAL",
                "availabilityImpact": "HIGH",
                "baseScore": 7.8,
                "baseSeverity": "HIGH",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "HIGH",
                "privilegesRequired": "LOW",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                "version": "3.1"
              },
              "exploitabilityScore": 1.8,
              "impactScore": 5.9,
              "source": "security-advisories@github.com",
              "type": "Secondary"
            }
          ]
        },
        "published": "2022-07-12T21:15:09.560",
        "references": [
          {
            "source": "security-advisories@github.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://seclists.org/fulldisclosure/2022/Nov/1"
          },
          {
            "source": "security-advisories@github.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2022/07/14/1"
          },
          {
            "source": "security-advisories@github.com",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "https://github.blog/2022-04-12-git-security-vulnerability-announced"
          },
          {
            "source": "security-advisories@github.com",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "https://github.com/git/git/security/advisories/GHSA-j342-m5hw-rr3v"
          },
          {
            "source": "security-advisories@github.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html"
          },
          {
            "source": "security-advisories@github.com",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDI325LOO2XBDDKLINOAQJEG6MHAURZE/"
          },
          {
            "source": "security-advisories@github.com",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DIKWISWUDFT2FAITYIA6372BVLH3OOOC/"
          },
          {
            "source": "security-advisories@github.com",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVOLER2PIGMHPQMDGG4RDE2KZB74QLA2/"
          },
          {
            "source": "security-advisories@github.com",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRZG5CDUQ27OWTPC5MQOR4UASNXHWEZS/"
          },
          {
            "source": "security-advisories@github.com",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDZRZAL7QULOB6V7MKT66MOMWJLBJPX4/"
          },
          {
            "source": "security-advisories@github.com",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YROCMBWYFKRSS64PO6FUNM6L7LKBUKVW/"
          },
          {
            "source": "security-advisories@github.com",
            "url": "https://lore.kernel.org/git/xmqqv8s2fefi.fsf%40gitster.g/T/#u"
          },
          {
            "source": "security-advisories@github.com",
            "url": "https://security.gentoo.org/glsa/202312-15"
          },
          {
            "source": "security-advisories@github.com",
            "url": "https://security.gentoo.org/glsa/202401-17"
          },
          {
            "source": "security-advisories@github.com",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "https://support.apple.com/kb/HT213496"
          }
        ],
        "sourceIdentifier": "security-advisories@github.com",
        "vulnStatus": "Modified",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-282"
              },
              {
                "lang": "en",
                "value": "CWE-427"
              }
            ],
            "source": "security-advisories@github.com",
            "type": "Primary"
          },
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-427"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Secondary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.