Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-29012
HistoryApr 25, 2023 - 8:44 p.m.

CVE-2023-29012 Git CMD erroneously executes `doskey.exe` in the current directory, if it exists

2023-04-2520:44:05
CWE-427
GitHub_M
www.cve.org
5
cve-2023-29012
git cmd
doskey.exe
uncontrolled search path
windows
vulnerability
security patch
workaround

CVSS3

7.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H

AI Score

8.1

Confidence

High

EPSS

0.001

Percentile

29.8%

Git for Windows is the Windows port of Git. Prior to version 2.40.1, any user of Git CMD who starts the command in an untrusted directory is impacted by an Uncontrolles Search Path Element vulnerability. Maliciously-placed doskey.exe would be executed silently upon running Git CMD. The problem has been patched in Git for Windows v2.40.1. As a workaround, avoid using Git CMD or, if using Git CMD, avoid starting it in an untrusted directory.

CNA Affected

[
  {
    "vendor": "git-for-windows",
    "product": "git",
    "versions": [
      {
        "version": "< 2.40.1",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.2

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H

AI Score

8.1

Confidence

High

EPSS

0.001

Percentile

29.8%