Information Exposure Affecting git/git package, versions [,2.30.6)[2.31.4,2.31.5)[2.32.3,2.32.4)[2.33.4,2.33.5)[2.34.4,2.34.5)[2.35.4,2.35.5)[2.36.2,2.36.3)[2.37.3,2.37.4)[2.38.0,2.38.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
2.46% (90th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-GITGIT-3057934
  • published21 Oct 2022
  • disclosed21 Oct 2022
  • creditKevin Backhouse

Introduced: 21 Oct 2022

CVE-2022-39260  (opens in a new tab)
CWE-787  (opens in a new tab)

How to fix?

Upgrade git/git to version 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, 2.37.4, 2.38.1 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure due to allowing a malicious actor to intentionally overflow the return value, leading to arbitrary heap writes. Because the resulting array is then passed to execv(), it is possible to leverage this attack to gain remote code execution on a victim machine.

Note

The victim must first allow access to git shell as a login shell in order to be vulnerable to this attack.

Workaround

Users who are unable to upgrade to the fixed version should disable git shell access via remote logins.

CVSS Scores

version 3.1