Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-52005

Опубликовано: 15 янв. 2025
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Git is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called "sideband channel". These messages will be prefixed with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information, or to mislead the user into executing untrusted scripts. As requested on the git-security mailing list, the patches are under discussion on the public mailing list. Users are advised to update as soon as possible. Users unable to upgrade should avoid recursive clones unless they are from trusted sources.

A flaw was found in Git. When cloning, fetching, or pushing from a server, informational or error messages are transported from the remote Git process to the client via a sideband channel. These messages are prefixed with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information or to mislead the user into executing untrusted scripts.

Отчет

This vulnerability is classified as moderate rather than important because it primarily affects informational messages rather than directly compromising repository integrity or executing arbitrary code. The issue arises from Git's failure to sanitize ANSI escape sequences in messages received over the sideband channel, which could allow a malicious remote repository to manipulate terminal output. However, exploitation requires user interaction, such as manually copying and executing misleading commands. Unlike higher-severity vulnerabilities, this does not provide direct unauthorized access, remote code execution, or privilege escalation, limiting its overall impact. The risk is further mitigated by best practices, such as avoiding recursive clones from untrusted sources. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a (CWE-116: Improper Encoding or Escaping of Output | CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Static code analysis and peer reviews help ensure input validation and output encoding are properly implemented, reducing the risk of system instability, data exposure, and security issues. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention, which ensures that unexpected or malicious output behavior is detectable post-deployment. In the event of successful exploitation, process isolation contains the impact to the affected workload through containerization, pod-level security policies, and network segmentation.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6gitOut of support scope
Red Hat Enterprise Linux 7gitWill not fix
Red Hat Fuse 7io.syndesis-syndesis-parentOut of support scope
Red Hat OpenShift Container Platform 4rhcosWill not fix
Red Hat Enterprise Linux 10gitFixedRHSA-2025:748213.05.2025
Red Hat Enterprise Linux 8gitFixedRHSA-2025:841403.06.2025
Red Hat Enterprise Linux 9gitFixedRHSA-2025:740913.05.2025
Red Hat Enterprise Linux 9.2 Extended Update SupportgitFixedRHSA-2025:764115.05.2025
Red Hat Enterprise Linux 9.4 Extended Update SupportgitFixedRHSA-2025:764015.05.2025
Red Hat Discovery 1.14registry.redhat.io/discovery/discovery-server-rhel9FixedRHSA-2025:838502.06.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-116
Дефект:
CWE-150
https://bugzilla.redhat.com/show_bug.cgi?id=2338289git: The sideband payload is passed unfiltered to the terminal in git

EPSS

Процентиль: 17%
0.00054
Низкий

7.5 High

CVSS3

Связанные уязвимости

ubuntu
5 месяцев назад

Git is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called "sideband channel". These messages will be prefixed with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information, or to mislead the user into executing untrusted scripts. As requested on the git-security mailing list, the patches are under discussion on the public mailing list. Users are advised to update as soon as possible. Users unable to upgrade should avoid recursive clones unless they are from trusted sources.

nvd
5 месяцев назад

Git is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called "sideband channel". These messages will be prefixed with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information, or to mislead the user into executing untrusted scripts. As requested on the git-security mailing list, the patches are under discussion on the public mailing list. Users are advised to update as soon as possible. Users unable to upgrade should avoid recursive clones unless they are from trusted sources.

debian
5 месяцев назад

Git is a source code management tool. When cloning from a server (or f ...

oracle-oval
16 дней назад

ELSA-2025-8414: git security update (MODERATE)

oracle-oval
29 дней назад

ELSA-2025-7409: git security update (MODERATE)

EPSS

Процентиль: 17%
0.00054
Низкий

7.5 High

CVSS3