5.1
CVSSv2

CVE-2021-21300

Published: 09/03/2021 Updated: 07/11/2023
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 456
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (i.e. the default file systems on Windows and macOS). Note that clean/smudge filters have to be configured for that. Git for Windows configures Git LFS by default, and is therefore vulnerable. The problem has been patched in the versions published on Tuesday, March 9th, 2021. As a workaound, if symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. Likewise, if no clean/smudge filters such as Git LFS are configured globally (i.e. _before_ cloning), the attack is foiled. As always, it is best to avoid cloning repositories from untrusted sources. The earliest impacted version is 2.14.2. The fix versions are: 2.30.1, 2.29.3, 2.28.1, 2.27.1, 2.26.3, 2.25.5, 2.24.4, 2.23.4, 2.22.5, 2.21.4, 2.20.5, 2.19.6, 2.18.5, 2.17.62.17.6.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

git-scm git

git-scm git 2.27.0

git-scm git 2.28.0

fedoraproject fedora 32

fedoraproject fedora 33

fedoraproject fedora 34

apple xcode

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #985120 CVE-2021-21300 (was: Re: Accepted git 1:2302-1 (source) into unstable) Package: git; Maintainer for git is Jonathan Nieder <jrnieder@gmailcom>; Source for git is src:git (PTS, buildd, popcon) Reported by: Jonathan Nieder <jrnieder@gmailcom> Date: Sat, 13 Mar 2021 02:24:01 UTC Sev ...
Git is an open-source distributed revision control system In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (ie the defau ...
Git is an open-source distributed revision control system In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (ie the defau ...
No description is available for this CVE ...
A security issue was found in Git up to version 2301 On case-insensitive file systems with support for symbolic links, if Git is configured globally to apply delay-capable clean/smudge filters (such as Git LFS), Git could be fooled into running remote code during a clone It is fixed in Git versions 2176, 2185, 2196, 2205, 2214, 2225 ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> git: malicious repositories can execute remote code while cloning <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: ...

Github Repositories

CVE-2021-21300 git多个版本中,对符号链接处理不严格。在大小写敏感(例如Linux)的文件系统上传文件到git后,使用大小写不敏感文件系统(例如Windows)的主机克隆恶意 仓库时可能导致远程命令执行 。 受影响版本 从 215 至 现有的 2301 解决方案 1、升级版本 2、如下 禁用git 的symlink: git c

remote code exec for git

CVE-2021-21300

CVE-2021-21300 just clone me then your machine will print "PWNED" ref:wwwopenwallcom/lists/oss-security/2021/03/09/3

zen minimal foundry template

zenfoundry-template a minimalist foundry boilerplate forge init --template githubcom/sambacha/zen-foundry-template templatescript #!/bin/sh GIT_AUTHOR_DATE="Sun, 01 Jan 2023 00:00:00 +0000" GIT_COMMITTER_DATE="Sun, 01 Jan 2023 00:00:00 +0000" git commit --allow-empty --allow-empty-message -m ''

git-submodules-exploit source: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2021-21300 Exploit Git is an open-source distributed revision control system In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto

Recent Articles

Beware the IDEs of March: Microsoft's latest monthly fixes land after frantic Exchange Server updates
The Register • Thomas Claburn in San Francisco • 09 Mar 2021

Bugs in Visual Studio, Visual Studio Code are the least of it US National Security Council urges review of Exchange Servers in wake of Hafnium attack Delayed, overbudget and broken. Of course Microsoft's finest would be found in NASA's Orion

Patch Tuesday A week after Microsoft warned that four zero-day flaws and three others in its Exchange Server were being actively exploited and issued out-of-band remediation, the cloudy Windows biz has delivered software fixes to address 82 other vulnerabilities as part of its monthly Patch Tuesday ritual. All told, that makes 89 CVEs for the month, 14 of which have been deemed critical. Microsoft says two of these vulnerabilities (CVE-2021-26411 and CVE-2021-27077) are publicly known and five a...