Vulnerability Details : CVE-2022-24765
Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access from those folders as a workaround. Alternatively, define or extend `GIT_CEILING_DIRECTORIES` to cover the _parent_ directory of the user profile, e.g. `C:\Users` if the user profile is located in `C:\Users\my-user-name`.
Exploit prediction scoring system (EPSS) score for CVE-2022-24765
Probability of exploitation activity in the next 30 days: 0.05%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 14 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-24765
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
[email protected] |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
[email protected] |
6.0
|
MEDIUM | CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N |
0.8
|
5.2
|
[email protected] |
CWE ids for CVE-2022-24765
-
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.Assigned by: [email protected] (Primary)
References for CVE-2022-24765
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/HVOLER2PIGMHPQMDGG4RDE2KZB74QLA2/
Mailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/TRZG5CDUQ27OWTPC5MQOR4UASNXHWEZS/
Mailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/BENQYTDGUL6TF3UALY6GSIEXIHUIYNWM/
Mailing List;Patch;Third Party Advisory
-
https://git-scm.com/docs/git#Documentation/git.txt-codeGITCEILINGDIRECTORIEScode
Vendor Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/DIKWISWUDFT2FAITYIA6372BVLH3OOOC/
Mailing List;Third Party Advisory
-
https://git-scm.com/book/en/v2/Appendix-A%3A-Git-in-Other-Environments-Git-in-Bash
Vendor Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/DDI325LOO2XBDDKLINOAQJEG6MHAURZE/
Mailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/UDZRZAL7QULOB6V7MKT66MOMWJLBJPX4/
Mailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/5PTN5NYEHYN2OQSHSAMCNICZNK2U4QH6/
Mailing List;Patch;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html
Mailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/SLP42KIZ6HACTVZMZLJLFJQ4W2XYT27M/
Mailing List;Patch;Third Party Advisory
-
https://support.apple.com/kb/HT213261
Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/YROCMBWYFKRSS64PO6FUNM6L7LKBUKVW/
Mailing List;Third Party Advisory
-
http://seclists.org/fulldisclosure/2022/May/31
Mailing List;Third Party Advisory
-
https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2
Mitigation;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2022/04/12/7
Mailing List;Third Party Advisory
Products affected by CVE-2022-24765
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
- cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*