An elevation of privilege vulnerability exists in Git for Visual Studio when it improperly parses configuration files. An attacker who successfully exploited the vulnerability could execute code in the context of another local user. To exploit the vulnerability, an authenticated attacker would need to modify Git configuration files on a system prior to a full installation of the application. The attacker would then need to convince another user on the system to execute specific Git commands. The update addresses the issue by changing the permissions required to edit configuration files.
Published 2019-08-14 21:15:18
Updated 2024-05-29 17:16:14
View at NVD,   CVE.org
Vulnerability category: Execute codeGain privilege

Products affected by CVE-2019-1211

Exploit prediction scoring system (EPSS) score for CVE-2019-1211

0.07%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2019-1211

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
3.7
LOW AV:L/AC:H/Au:N/C:P/I:P/A:P
1.9
6.4
NIST
7.3
HIGH CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1.3
5.9
NIST

References for CVE-2019-1211

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!