Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, repositories with submodules can be crafted in a way that exploits a bug in Git whereby it can be fooled into writing files not into the submodule's worktree but into a `.git/` directory. This allows writing a hook that will be executed while the clone operation is still running, giving the user no opportunity to inspect the code that is being executed. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. If symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. As always, it is best to avoid cloning repositories from untrusted sources.
Published 2024-05-14 18:40:47
Updated 2024-06-26 10:15:12
Source GitHub, Inc.
View at NVD,   CVE.org

Products affected by CVE-2024-32002

Exploit prediction scoring system (EPSS) score for CVE-2024-32002

71.00%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2024-32002

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
9.1
CRITICAL CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
N/A
N/A
GitHub, Inc. 2024-05-14
9.0
CRITICAL CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
2.2
6.0
NIST 2024-05-23
9.0
CRITICAL CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
2.2
6.0
GitHub, Inc. 2024-05-14
9.0
CRITICAL CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/...
N/A
N/A
MS-CVE-2024-32002 2024-05-14
9.0
CRITICAL CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
N/A
N/A
RedHat-CVE-2024-32002 2024-05-15

CWE ids for CVE-2024-32002

  • The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
    Assigned by:
    • a0819718-46f1-4df5-94e2-005712e83aaa (Primary)
    • security-advisories@github.com (Secondary)
  • The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
    Assigned by: nvd@nist.gov (Primary)
  • The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
    Assigned by:
    • a0819718-46f1-4df5-94e2-005712e83aaa (Primary)
    • security-advisories@github.com (Secondary)

References for CVE-2024-32002

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!