Source Code Management Tool Vulnerability in Git Software
CVE-2024-52005

7.5HIGH

Key Information:

Vendor
Git
Status
Git
Vendor
CVE Published:
15 January 2025

Summary

A security vulnerability in Git involves improper handling of messages transported from a remote server during clone, fetch, or push operations. Malicious actors can exploit this flaw by leveraging ANSI escape sequences that are not adequately protected by Git. This could allow them to obscure genuine information or prompt users to execute untrusted scripts, posing a significant risk during collaborative development workflows. Users are advised to promptly update to the latest version and avoid recursive clones from untrusted sources to mitigate potential exploitation.

Affected Version(s)

git >= 2.48.0, <= 2.48.1 <= 2.48.0, 2.48.1

git >= 2.47.0, <= 2.47.1 <= 2.47.0, 2.47.1

git >= 2.46.0, <= 2.46.3 <= 2.46.0, 2.46.3

References

CVSS V4

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.