Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-29007

Опубликовано: 25 апр. 2023
Источник: redhat
CVSS3: 7.8

Описание

Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted .gitmodules file with submodule URLs that are longer than 1024 characters can used to exploit a bug in config.c::git_config_copy_or_rename_section_in_file(). This bug can be used to inject arbitrary configuration into a user's $GIT_DIR/config when attempting to remove the configuration section associated with that submodule. When the attacker injects configuration values which specify executables to run (such as core.pager, core.editor, core.sshCommand, etc.) this can lead to a remote code execution. A fix A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid running git submodule deinit on untrusted repositories or without prior inspection of any submodule sections in $GIT_DIR/config.

A vulnerability was found in Git. This security flaw occurs when renaming or deleting a section from a configuration file, where certain malicious configuration values may be misinterpreted as the beginning of a new configuration section. This flaw leads to arbitrary configuration injection.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat CodeReady Studio 12gitOut of support scope
Red Hat Enterprise Linux 6gitOut of support scope
Red Hat Enterprise Linux 7gitFixedRHSA-2023:326323.05.2023
Red Hat Enterprise Linux 8gitFixedRHSA-2023:324622.05.2023
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsgitFixedRHSA-2023:319217.05.2023
Red Hat Enterprise Linux 8.2 Advanced Update SupportgitFixedRHSA-2023:338231.05.2023
Red Hat Enterprise Linux 8.4 Extended Update SupportgitFixedRHSA-2023:324322.05.2023
Red Hat Enterprise Linux 8.6 Extended Update SupportgitFixedRHSA-2023:324722.05.2023
Red Hat Enterprise Linux 9gitFixedRHSA-2023:324522.05.2023
Red Hat Enterprise Linux 9.0 Extended Update SupportgitFixedRHSA-2023:324822.05.2023

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=2188338git: arbitrary configuration injection when renaming or deleting a section from a configuration file

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
около 2 лет назад

Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted `.gitmodules` file with submodule URLs that are longer than 1024 characters can used to exploit a bug in `config.c::git_config_copy_or_rename_section_in_file()`. This bug can be used to inject arbitrary configuration into a user's `$GIT_DIR/config` when attempting to remove the configuration section associated with that submodule. When the attacker injects configuration values which specify executables to run (such as `core.pager`, `core.editor`, `core.sshCommand`, etc.) this can lead to a remote code execution. A fix A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid running `git submodule deinit` on untrusted repositories or without prior inspection of any submodule sections in `$GIT_DIR/config`.

CVSS3: 7
nvd
около 2 лет назад

Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted `.gitmodules` file with submodule URLs that are longer than 1024 characters can used to exploit a bug in `config.c::git_config_copy_or_rename_section_in_file()`. This bug can be used to inject arbitrary configuration into a user's `$GIT_DIR/config` when attempting to remove the configuration section associated with that submodule. When the attacker injects configuration values which specify executables to run (such as `core.pager`, `core.editor`, `core.sshCommand`, etc.) this can lead to a remote code execution. A fix A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid running `git submodule deinit` on untrusted repositories or without prior inspection of any submodule sections in `$GIT_DIR/config`.

msrc
около 2 лет назад

GitHub: CVE-2023-29007 Arbitrary configuration injection via `git submodule deinit`

CVSS3: 7
debian
около 2 лет назад

Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2. ...

CVSS3: 7.8
fstec
около 2 лет назад

Уязвимость функции git_config_copy_or_rename_section_in_file файла config.c распределенной системы управления версиями Git, позволяющая нарушителю выполнить произвольный код

7.8 High

CVSS3

Уязвимость CVE-2023-29007