Lucene search

K
nvd[email protected]NVD:CVE-2023-29007
HistoryApr 25, 2023 - 9:15 p.m.

CVE-2023-29007

2023-04-2521:15:10
CWE-74
web.nvd.nist.gov
6
git
cve-2023-29007
remote code execution
`.gitmodules` file
configuration section
`$git_dir/config`
submodule urls
bug exploit
workaround

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

75.0%

Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted .gitmodules file with submodule URLs that are longer than 1024 characters can used to exploit a bug in config.c::git_config_copy_or_rename_section_in_file(). This bug can be used to inject arbitrary configuration into a user’s $GIT_DIR/config when attempting to remove the configuration section associated with that submodule. When the attacker injects configuration values which specify executables to run (such as core.pager, core.editor, core.sshCommand, etc.) this can lead to a remote code execution. A fix A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid running git submodule deinit on untrusted repositories or without prior inspection of any submodule sections in $GIT_DIR/config.

Affected configurations

NVD
Node
git-scmgitRange<2.30.9
OR
git-scmgitRange2.31.02.31.8
OR
git-scmgitRange2.32.02.32.7
OR
git-scmgitRange2.33.02.33.8
OR
git-scmgitRange2.34.02.34.8
OR
git-scmgitRange2.35.02.35.8
OR
git-scmgitRange2.36.02.36.5
OR
git-scmgitRange2.37.02.37.7
OR
git-scmgitRange2.38.02.38.5
OR
git-scmgitRange2.39.02.39.3
OR
git-scmgitMatch2.40.0
Node
fedoraprojectfedoraMatch36
OR
fedoraprojectfedoraMatch37
OR
fedoraprojectfedoraMatch38

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

75.0%