Source Code Management Tool Vulnerability in Git Software
CVE-2024-52005
7.5HIGH
Key Information:
- Vendor
- Git
- Status
- Git
- Vendor
- CVE Published:
- 15 January 2025
Summary
A security vulnerability in Git involves improper handling of messages transported from a remote server during clone, fetch, or push operations. Malicious actors can exploit this flaw by leveraging ANSI escape sequences that are not adequately protected by Git. This could allow them to obscure genuine information or prompt users to execute untrusted scripts, posing a significant risk during collaborative development workflows. Users are advised to promptly update to the latest version and avoid recursive clones from untrusted sources to mitigate potential exploitation.
Affected Version(s)
git >= 2.48.0, <= 2.48.1 <= 2.48.0, 2.48.1
git >= 2.47.0, <= 2.47.1 <= 2.47.0, 2.47.1
git >= 2.46.0, <= 2.46.3 <= 2.46.0, 2.46.3
References
CVSS V4
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown
Timeline
Vulnerability published
Vulnerability Reserved