Git for Windows's config file of `connect.exe` is susceptible to malicious placing
CVE-2023-29011

7.6HIGH

Key Information:

Status
Vendor
CVE Published:
25 April 2023

Summary

The vulnerability in Git for Windows involves a hard-coded location for the connect.exe config file, C:\etc\connectrc. This setup allows authenticated users on multi-user machines to place malicious files in this directory, potentially compromising the integrity of proxy connections. The vulnerability can be mitigated by upgrading to Git for Windows v2.40.1 or by implementing restrictive access controls on folders used by Git commands. Users should remain vigilant for unauthorized connectrc files in the etc directory.

Affected Version(s)

git < 2.40.1

References

CVSS V3.1

Score:
7.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.