Information Exposure Affecting git/git package, versions [,2.30.6)[2.31.4,2.31.5)[2.32.3,2.32.4)[2.33.4,2.33.5)[2.34.4,2.34.5)[2.35.4,2.35.5)[2.36.2,2.36.3)[2.37.3,2.37.4)[2.38.0,2.38.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.12% (47th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-GITGIT-3057203
  • published20 Oct 2022
  • disclosed20 Oct 2022
  • creditCory Snider

Introduced: 20 Oct 2022

CVE-2022-39253  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade git/git to version 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, 2.37.4, 2.38.1 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure when an attacker convinces a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine.

Workaround

Users who are unable to upgrade to the fixed version should:

  1. Avoid cloning untrusted repositories using the --local optimization when on a shared machine, by passing the --no-local option to git clone or cloning from a URL that uses the file:// scheme.

  2. Avoid cloning repositories from untrusted sources with --recurse-submodules. Or, run git config --global protocol.file.allow user.

CVSS Scores

version 3.1