Git for Windows's config file of `connect.exe` is susceptible to malicious placing
CVE-2023-29011
7.6HIGH
Summary
The vulnerability in Git for Windows involves a hard-coded location for the connect.exe
config file, C:\etc\connectrc
. This setup allows authenticated users on multi-user machines to place malicious files in this directory, potentially compromising the integrity of proxy connections. The vulnerability can be mitigated by upgrading to Git for Windows v2.40.1 or by implementing restrictive access controls on folders used by Git commands. Users should remain vigilant for unauthorized connectrc
files in the etc
directory.
Affected Version(s)
git < 2.40.1
References
CVSS V3.1
Score:
7.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved