NA

CVE-2022-39253

Published: 19/10/2022 Updated: 27/12/2023
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Git is an open source, scalable, distributed revision control system. Versions before 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` directory. The problem has been patched in the versions published on 2022-10-18, and backported to v2.30.x. Potential workarounds: Avoid cloning untrusted repositories using the `--local` optimization when on a shared machine, either by passing the `--no-local` option to `git clone` or cloning from a URL that uses the `file://` scheme. Alternatively, avoid cloning repositories from untrusted sources with `--recurse-submodules` or run `git config --global protocol.file.allow user`.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

git-scm git 2.38.0

git-scm git

fedoraproject fedora 35

fedoraproject fedora 36

fedoraproject fedora 37

apple xcode

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #1022046 git: CVE-2022-39253 CVE-2022-39260 Package: src:git; Maintainer for src:git is Jonathan Nieder <jrnieder@gmailcom>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 19 Oct 2022 12:48:02 UTC Severity: grave Tags: security, upstream Found in versions git/1:2372-1, g ...
Synopsis Moderate: git security and bug fix update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for git is now available for Red Hat Enterprise Linux 9Red Hat Product Security has rated this update as having ...
Synopsis Moderate: git security and bug fix update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for git is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having ...
Several security issues were fixed in Git ...
Several security issues were fixed in Git ...
Git is an open source, scalable, distributed revision control system Versions prior to 2306, 2315, 2324, 2335, 2345, 2355, 2363, and 2374 are subject to exposure of sensitive information to a malicious actor When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of ...
Git is an open source, scalable, distributed revision control system Versions prior to 2306, 2315, 2324, 2335, 2345, 2355, 2363, and 2374 are subject to exposure of sensitive information to a malicious actor When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of ...
DescriptionThe MITRE CVE dictionary describes this issue as: Git is an open source, scalable, distributed revision control system Versions prior to 2306, 2315, 2324, 2335, 2345, 2355, 2363, and 2374 are subject to exposure of sensitive information to a malicious actor When performing a local clone (where the source and target of t ...
ALAS-2022-254 Amazon Linux 2022 Security Advisory: ALAS-2022-254 Advisory Release Date: 2022-12-06 16:45 Pacific ...

Github Repositories

Git file transport See reprosh cd super git submodule add /sub This results in: fatal: transport 'file' not allowed This is a new limitation which seems to have come about as a result of a patch related to security Workaround git -c protocolfileallow=always submodule add /sub Sources bugslaunchpadnet/ubuntu/

New things come everyday, my brain could run out of space. This repository is working like my hard disk to store the things which I learn everyday.

The Things I Don't Know Table of Contents Git Find the current tag Remove a directory from Git and local How to set username and email in Git Compare two git branches Create new tag from another tag Linux Commands Count a word in a file Docker Procceed and delete all stopped containers Redis Get information about redis server Git fatal: transport 'file&#

docker host file read (using cve-2022-39253) poc PoC reproduce environment $ docker run --name=cve-2022-39253 -ti -d ssst0n3/docker_archive:git_cve-2022-39253 $ docker attach --detach-keys ctrl-x cve-2022-39253 # (use ctrl-x to exit container's terminal) # (wait minutes for environment starting ) Ubuntu 2204 LTS ubuntu ttyS0 ubuntu login: root Password: root