Git for Windows' installer is susceptible to DLL side loading attacks
CVE-2023-22743

7.3HIGH

Key Information:

Status
Vendor
CVE Published:
14 February 2023

Summary

A DLL side-loading vulnerability exists in Git for Windows versions prior to 2.39.2, allowing local users with write access to exploit the installation process. By placing a malicious DLL in a specifically named subdirectory next to the Git for Windows installer, adversaries can trick Windows into loading the malicious DLL during an automated upgrade. This could lead to unauthorized actions being performed with elevated privileges. It is crucial to keep the environment secure by avoiding untrusted files in the Downloads folder and moving installers to a safe directory before execution. Version 2.39.2 offers a patch to mitigate this issue.

Affected Version(s)

git < 2.39.2

References

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.