Lucene search

K
archlinuxArchLinuxASA-202004-21
HistoryApr 22, 2020 - 12:00 a.m.

[ASA-202004-21] git: information disclosure

2020-04-2200:00:00
security.archlinux.org
26
git
information disclosure
vulnerability
url
credential
attacker
remote
passwords
protocols
submodule
packages
security advisory

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

9.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

EPSS

0.006

Percentile

79.7%

Arch Linux Security Advisory ASA-202004-21

Severity: High
Date : 2020-04-22
CVE-ID : CVE-2020-11008
Package : git
Type : information disclosure
Remote : Yes
Link : https://security.archlinux.org/AVG-1138

Summary

The package git before version 2.26.2-1 is vulnerable to information
disclosure.

Resolution

Upgrade to 2.26.2-1.

pacman -Syu “git>=2.26.2-1”

The problem has been fixed upstream in version 2.26.2.

Workaround

None.

Description

A vulnerability has been found in git before 2.26.2. With a crafted URL
that contains a newline or empty host, or lacks a scheme, the
credential helper machinery can be fooled into providing credential
information that is not appropriate for the protocol in use and host
being contacted.

Unlike the vulnerability CVE-2020-5260 fixed in v2.26.1, the
credentials are not for a host of the attacker’s choosing; instead,
they are for some unspecified host (based on how the configured
credential helper handles an absent “host” parameter).

The attack has been made impossible by refusing to work with under-
specified credential patterns.

Impact

A remote attacker might be able to retrieve passwords or other
credentials by tricking a user into cloning from a crafted URL, either
directly or via Git submodules, or package systems built around Git.

References

https://github.com/git/git/security/advisories/GHSA-hjc9-x69f-jqj7
https://github.com/git/git/compare/v2.17.4...v2.17.5
https://security.archlinux.org/CVE-2020-11008

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanygit< 2.26.2-1UNKNOWN

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

9.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

EPSS

0.006

Percentile

79.7%