8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
git is vulnerable to authorization bypass. The vulnerability exists through the Recursive submodule cloning that allows using git directory twice with synonymous directory name written in .git/.
CPE | Name | Operator | Version |
---|---|---|---|
git | eq | 2.18.1__3.el8 | |
rh-git218-git | eq | 2.18.1__3.el7 | |
rh-git218-git | eq | 2.18.1__2.el7 | |
git:3.11 | eq | 2.24.1-r0 | |
git:3.7 | eq | 2.15.3-r0 |
lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html
access.redhat.com/errata/RHSA-2019:4356
access.redhat.com/errata/RHSA-2020:0228
access.redhat.com/security/updates/classification/#important
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1349
public-inbox.org/git/[email protected]/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C