Git clone remote code execution vulnerability in git-for-windows
CVE-2022-41953
Summary
The Git GUI tool, part of Git for Windows, is designed for users who prefer a graphical interface over command-line interactions. A significant design flaw pertaining to the Tcl/Tk framework on Windows has been identified, allowing malicious repositories to include a crafted aspell.exe
in their top-level directory. Consequently, when users clone such repositories, the Git GUI automatically processes this executable without prior user verification, resulting in unintended execution of potentially harmful code. This vulnerability has been resolved in version 2.39.1. Users are strongly encouraged to upgrade to the latest version or avoid using Git GUI for cloning repositories from untrusted sources.
Affected Version(s)
git < 2.39.1
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved