NA

CVE-2023-22742

Published: 20/01/2023 Updated: 07/11/2023
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 0

Vulnerability Summary

libgit2 is a cross-platform, linkable library implementation of Git. When using an SSH remote with the optional libssh2 backend, libgit2 does not perform certificate checking by default. Prior versions of libgit2 require the caller to set the `certificate_check` field of libgit2's `git_remote_callbacks` structure - if a certificate check callback is not set, libgit2 does not perform any certificate checking. This means that by default - without configuring a certificate check callback, clients will not perform validation on the server SSH keys and may be subject to a man-in-the-middle attack. Users are encouraged to upgrade to v1.4.5 or v1.5.1. Users unable to upgrade should ensure that all relevant certificates are manually checked.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libgit2 libgit2

libgit2 libgit2 1.5.0

Vendor Advisories

Debian Bug report logs - #1029368 libgit2: CVE-2023-22742: fails to verify SSH keys by default Package: src:libgit2; Maintainer for src:libgit2 is Utkarsh Gupta <utkarsh@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 21 Jan 2023 21:21:02 UTC Severity: important Tags: security, upstream ...
Description<!---->A flaw was found in libgit2, a cross-platform, linkable library implementation of Git When using an SSH remote with the optional libssh2 backend, libgit2 does not perform certificate checking by default Prior versions of libgit2 require the caller to set the `certificate_check` field of libgit2's `git_remote_callbacks` structure ...