๐Ÿ” CVE Alert

CVE-2022-39260

HIGH 8.5

Git vulnerable to Remote Code Execution via Heap overflow in `git shell`

CVSS Score
8.5
EPSS Score
0.0%
EPSS Percentile
0th

Git is an open source, scalable, distributed revision control system. `git shell` is a restricted login shell that can be used to implement Git's push/pull functionality via SSH. In versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4, the function that splits the command arguments into an array improperly uses an `int` to represent the number of entries in the array, allowing a malicious actor to intentionally overflow the return value, leading to arbitrary heap writes. Because the resulting array is then passed to `execv()`, it is possible to leverage this attack to gain remote code execution on a victim machine. Note that a victim must first allow access to `git shell` as a login shell in order to be vulnerable to this attack. This problem is patched in versions 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 and users are advised to upgrade to the latest version. Disabling `git shell` access via remote logins is a viable short-term workaround.

CWE CWE-787 CWE-122
Vendor git
Product git
Published Oct 19, 2022
Last Updated Aug 3, 2024
Stay Ahead of the Next One

Get instant alerts for git git

Be the first to know when new high vulnerabilities affecting git git are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

git / git
< 2.30.6 > 2.31.0, < 2.31.5 > 2.32.0, < 2.32.4 > 2.33.0, < 2.33.5 > 2.34.0, < 2.34.5 > 2.34.0, < 2.35.5 > 2.35.0, < 2.36.3 > 2.37.0, < 2.37.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/git/git/security/advisories/GHSA-rjr6-wcq6-83p6 lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UKFHE4KVD7EKS5J3KTDFVBEKU3CLXGVV/ support.apple.com: https://support.apple.com/kb/HT213496 lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OHNO2FB55CPX47BAXMBWUBGWHO6N6ZZH/ seclists.org: http://seclists.org/fulldisclosure/2022/Nov/1 lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C7B6JPKX5CGGLAHXJVQMIZNNEEB72FHD/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html security.gentoo.org: https://security.gentoo.org/glsa/202312-15