漏洞标题
Git 容易被基于本地克隆的数据外逃与非本地传输攻击所攻击
漏洞描述信息
Git存在漏洞,允许使用非本地传输的基于克隆的数据泄露
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
漏洞类别
N/A
漏洞标题
Git vulnerable to local clone-based data exfiltration with non-local transports
漏洞描述信息
Git is a revision control system. Using a specially-crafted repository, Git prior to versions 2.39.2, 2.38.4, 2.37.6, 2.36.5, 2.35.7, 2.34.7, 2.33.7, 2.32.6, 2.31.7, and 2.30.8 can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source `$GIT_DIR/objects` directory contains symbolic links, the `objects` directory itself may still be a symbolic link. These two may be combined to include arbitrary files based on known paths on the victim's filesystem within the malicious repository's working copy, allowing for data exfiltration in a similar manner as CVE-2022-39253.
A fix has been prepared and will appear in v2.39.2 v2.38.4 v2.37.6 v2.36.5 v2.35.7 v2.34.7 v2.33.7 v2.32.6, v2.31.7 and v2.30.8. If upgrading is impractical, two short-term workarounds are available. Avoid cloning repositories from untrusted sources with `--recurse-submodules`. Instead, consider cloning repositories without recursively cloning their submodules, and instead run `git submodule update` at each layer. Before doing so, inspect each new `.gitmodules` file to ensure that it does not contain suspicious module URLs.
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
漏洞类别
在文件访问前对链接解析不恰当(链接跟随)
漏洞标题
Git 后置链接漏洞
漏洞描述信息
Git是一套免费、开源的分布式版本控制系统。 Git存在安全漏洞。攻击者利用该漏洞导致数据泄露。以下版本受到影响:2.39版本至2.39.2之前版本、2.38版本至2.38.4之前版本、2.37版本至2.37.6之前版本、2.36版本至2.36.5之前版本、2.35版本至2.35.7之前版本、2.34版本至2.34.7之前版本、2.33版本至2.33.7之前版本、2.32版本至2.32.6之前版本、2.31版本至2.31.7之前版本、2.30版本至2.30.8之前版本。
CVSS信息
N/A
漏洞类别
后置链接