Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-29007

Опубликовано: 25 апр. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7

Описание

Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted .gitmodules file with submodule URLs that are longer than 1024 characters can used to exploit a bug in config.c::git_config_copy_or_rename_section_in_file(). This bug can be used to inject arbitrary configuration into a user's $GIT_DIR/config when attempting to remove the configuration section associated with that submodule. When the attacker injects configuration values which specify executables to run (such as core.pager, core.editor, core.sshCommand, etc.) this can lead to a remote code execution. A fix A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid running git submodule deinit on untrusted repositories or without prior inspection of any submodule sections in $GIT_DIR/config.

РелизСтатусПримечание
bionic

released

1:2.17.1-1ubuntu0.18
devel

released

1:2.39.2-1ubuntu1.1
esm-infra/bionic

not-affected

1:2.17.1-1ubuntu0.18
esm-infra/focal

not-affected

1:2.25.1-1ubuntu3.11
esm-infra/xenial

released

1:2.7.4-0ubuntu1.10+esm7
focal

released

1:2.25.1-1ubuntu3.11
jammy

released

1:2.34.1-1ubuntu1.9
kinetic

released

1:2.37.2-1ubuntu1.5
lunar

released

1:2.39.2-1ubuntu1.1
trusty

ignored

end of standard support

Показывать по

EPSS

Процентиль: 76%
0.01011
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
redhat
около 2 лет назад

Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted `.gitmodules` file with submodule URLs that are longer than 1024 characters can used to exploit a bug in `config.c::git_config_copy_or_rename_section_in_file()`. This bug can be used to inject arbitrary configuration into a user's `$GIT_DIR/config` when attempting to remove the configuration section associated with that submodule. When the attacker injects configuration values which specify executables to run (such as `core.pager`, `core.editor`, `core.sshCommand`, etc.) this can lead to a remote code execution. A fix A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid running `git submodule deinit` on untrusted repositories or without prior inspection of any submodule sections in `$GIT_DIR/config`.

CVSS3: 7
nvd
около 2 лет назад

Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted `.gitmodules` file with submodule URLs that are longer than 1024 characters can used to exploit a bug in `config.c::git_config_copy_or_rename_section_in_file()`. This bug can be used to inject arbitrary configuration into a user's `$GIT_DIR/config` when attempting to remove the configuration section associated with that submodule. When the attacker injects configuration values which specify executables to run (such as `core.pager`, `core.editor`, `core.sshCommand`, etc.) this can lead to a remote code execution. A fix A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid running `git submodule deinit` on untrusted repositories or without prior inspection of any submodule sections in `$GIT_DIR/config`.

msrc
около 2 лет назад

GitHub: CVE-2023-29007 Arbitrary configuration injection via `git submodule deinit`

CVSS3: 7
debian
около 2 лет назад

Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2. ...

CVSS3: 7.8
fstec
около 2 лет назад

Уязвимость функции git_config_copy_or_rename_section_in_file файла config.c распределенной системы управления версиями Git, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 76%
0.01011
Низкий

7 High

CVSS3