8000 Recursive clones can circumvent `core.protectNTFS` protections · Advisory · git/git · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Recursive clones can circumvent `core.protectNTFS` protections

High
dscho published GHSA-4qvh-qvv7-frc7 Dec 13, 2019

Package

Git

Affected versions

<=2.14.5, 2.15.3, 2.16.5, 2.17.2, 2.18.1, 2.19.2, 2.20.1, 2.21.0, 2.22.1, 2.23.0, 2.24.0

Patched versions

2.24.1, 2.23.1, 2.22.2, 2.21.1, 2.20.2, 2.19.3, 2.18.2, 2.17.3, 2.16.6, 2.15.4, 2.14.6

Description

Impact

When cloning onto a Windows drive or onto a mounted file share with NTFS short names enabled, Git could be tricked into writing a submodule's .git file such that it would have an unexpected short name (e.g. git~2). This would allow maliciously-crafted submodules to circumvent the protections of core.protectNTFS and overwrite the contents of the .git file and thereby causing remote code to be executed during the recursive clone.

This affects Git for Windows, and potentially any platform where Git is used to clone onto a mounted network drive.

Patches

The problem has been patched in the versions published on Tuesday, December 10th, 2019.

On Windows, it is recommended to upgrade to Git for Windows v2.24.1(2).

Workarounds

Avoid running git clone --recurse-submodules with untrusted repositories.

References

Severity

High

CVE ID

CVE-2019-1349

Weaknesses

No CWEs
0