The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade git-for-windows/git
to version 2.40.1 or higher.
Affected versions of this package are vulnerable to External Control of File Name or Path when the gettext()
function uses the hard-coded path C:\mingw64\share\locale
to look for localized messages. Since any authenticated user has the permission to create folders in C:\
, it is possible for low-privilege users to place fake messages in that location, where git.exe
will pick them up.
For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It does require local write access by the attacker, which makes this attack vector less likely.
This vulnerability can be avoided by not working on a Windows machine with shared accounts, or by creating an empty C:\mingw64
folder. Alternatively, users who have administrative rights may remove the permission to create folders in C:\
.