Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-23618

Опубликовано: 14 мар. 2023
Источник: msrc
EPSS Низкий

Описание

GitHub: CVE-2023-23618 Git for Windows Remote Code Execution Vulnerability

FAQ

Why is this GitHub CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Git for Windows software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.

Обновления

ПродуктСтатьяОбновление
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
Microsoft Visual Studio 2022 version 17.0
Microsoft Visual Studio 2022 version 17.2
Microsoft Visual Studio 2022 version 17.4
Microsoft Visual Studio 2022 version 17.5

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 21%
0.00067
Низкий

Связанные уязвимости

CVSS3: 8.6
nvd
почти 3 года назад

Git for Windows is the Windows port of the revision control system Git. Prior to Git for Windows version 2.39.2, when `gitk` is run on Windows, it potentially runs executables from the current directory inadvertently, which can be exploited with some social engineering to trick users into running untrusted code. A patch is available in version 2.39.2. As a workaround, avoid using `gitk` (or Git GUI's "Visualize History" functionality) in clones of untrusted repositories.

CVSS3: 8.6
fstec
почти 3 года назад

Уязвимость распределенной системы контроля версий Git для Windows, связанная с использованием ненадёжного пути поиска при проверки орфографии клонированных репозиториев, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 21%
0.00067
Низкий