关联漏洞
介绍
# CVE-2024-32002
## STILL DEVELOPING
This vulnerability affect Git with version:
* `2.45.0`
## Proof Of Concept
The POC can trigger an RCE (Remote Command Execution) using the `git clone` command via specific vulnerable use of submodules of git that follow symlinks, so the context need to have `core.symlinks` to `true` for work correctly.
> **NOTE:** This is possible via `git config --global core.symlinks true`
### How it work
For trigger the rce you need to use two different repositories.
The first repository include a submodule that include a specific path with a symlink to a `.git` directory.
The second repository include a malicious hook that is used as a submodule in the first repository, and contain a script called `post-checkout` that contain malicious code that will be run exploiting the case-insensitive filesystem.
**This is a vulnerability analysis tool for educational purposes only**
文件快照
[4.0K] /data/pocs/bba48be24de884dda07fb2f63cb9dd2e51317c96
├── [1.8K] CVE-2024-32002.py
└── [ 921] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。