Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-32004
HistoryMay 14, 2024 - 6:46 p.m.

CVE-2024-32004 Git vulnerable to Remote Code Execution while cloning special-crafted local repositories

2024-05-1418:46:32
CWE-114
GitHub_M
github.com
9
git
remote code execution
clone
vulnerable
special-crafted
local repositories
security patch

CVSS3

8.1

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

7.3

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, an attacker can prepare a local repository in such a way that, when cloned, will execute arbitrary code during the operation. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. As a workaround, avoid cloning repositories from untrusted sources.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:git:git:2.45.0:*:*:*:*:*:*:*"
    ],
    "vendor": "git",
    "product": "git",
    "versions": [
      {
        "status": "affected",
        "version": "2.45.0"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:git:git:2.44.0:*:*:*:*:*:*:*"
    ],
    "vendor": "git",
    "product": "git",
    "versions": [
      {
        "status": "affected",
        "version": "2.44.0"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:git:git:2.43.0:*:*:*:*:*:*:*"
    ],
    "vendor": "git",
    "product": "git",
    "versions": [
      {
        "status": "affected",
        "version": "2.43.0",
        "lessThan": "2.43.4",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:git:git:2.42.0:*:*:*:*:*:*:*"
    ],
    "vendor": "git",
    "product": "git",
    "versions": [
      {
        "status": "affected",
        "version": "2.42.0",
        "lessThan": "2.42.2",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:git:git:2.41.0:*:*:*:*:*:*:*"
    ],
    "vendor": "git",
    "product": "git",
    "versions": [
      {
        "status": "affected",
        "version": "2.41.0"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:git:git:2.40.0:*:*:*:*:*:*:*"
    ],
    "vendor": "git",
    "product": "git",
    "versions": [
      {
        "status": "affected",
        "version": "2.40.0",
        "lessThan": "2.40.2",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:git:git:*:*:*:*:*:*:*:*"
    ],
    "vendor": "git",
    "product": "git",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "2.39.4",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.1

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

7.3

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total