9.3
CVSSv2

CVE-2019-19604

Published: 11/12/2019 Updated: 07/11/2023
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 829
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Arbitrary command execution is possible in Git prior to 2.20.2, 2.21.x prior to 2.21.1, 2.22.x prior to 2.22.2, 2.23.x prior to 2.23.1, and 2.24.x prior to 2.24.1 because a "git submodule update" operation can run commands found in the .gitmodules file of a malicious repository.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

git-scm git

debian debian linux 9.0

debian debian linux 10.0

fedoraproject fedora 30

fedoraproject fedora 31

opensuse leap 15.1

Vendor Advisories

Several security issues were fixed in Git ...
Several vulnerabilities have been discovered in git, a fast, scalable, distributed revision control system CVE-2019-1348 It was reported that the --export-marks option of git fast-import is exposed also via the in-stream command feature export-marks=, allowing to overwrite arbitrary paths CVE-2019-1387 It was discovered that s ...
A flaw was found in the git fast-import command where it provides the export-marks feature that may unexpectedly overwrite arbitrary paths An attacker can abuse this flaw if they can control the input passed to the fast-import command by using the export-marks feature and overwrite arbitrary files, but would not have complete control on the conten ...
Git mistakes some paths for relative paths allowing writing outside of the worktree while cloning (CVE-2019-1351) NTFS protections inactive when running Git in the Windows Subsystem for Linux (CVE-2019-1353) remote code execution in recursive clones with nested submodules (CVE-2019-1387) Arbitrary path overwriting via export-marks command option (C ...
Severity Unknown Remote Unknown Type Unknown Description AVG-1073 git 2240-1 2241-1 High Testing ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Multiple vulnerabilities fixed in Git <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Johannes Schindelin &lt;Joh ...