目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1020 CNY

100%

CVE-2024-32002— Microsoft Visual Studio 安全漏洞

CVSS 9.1 · Critical EPSS 79.59% · P99
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2024-32002の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Git's recursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Execution
ソース: NVD (National Vulnerability Database)
脆弱性説明
Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, repositories with submodules can be crafted in a way that exploits a bug in Git whereby it can be fooled into writing files not into the submodule's worktree but into a `.git/` directory. This allows writing a hook that will be executed while the clone operation is still running, giving the user no opportunity to inspect the code that is being executed. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. If symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. As always, it is best to avoid cloning repositories from untrusted sources.
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
对路径名的限制不恰当(路径遍历)
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Microsoft Visual Studio 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Microsoft Visual Studio是美国微软(Microsoft)公司的一款开发工具套件系列产品,也是一个基本完整的开发工具集,它包括了整个软件生命周期中所需要的大部分工具。 Microsoft Visual Studio存在安全漏洞的相关信息,请随时关注CNNVD或厂商公告。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

Shenlong 10 Questions — AI 深度分析

十问解析:根本原因、利用方式、修复建议、紧迫性。摘要免费,完整版需登录。

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
gitgit = 2.45.0 -

II. CVE-2024-32002の公開POC

#POC説明ソースリンクShenlongリンク
1Nonehttps://github.com/Disseminator/CVE-2024-32002POC詳細
2A submodule for exploiting CVE-2024-32002 vulnerability.https://github.com/markuta/hookyPOC詳細
3Exploit PoC for CVE-2024-32002https://github.com/amalmurali47/git_rcePOC詳細
4Hook for the PoC for exploiting CVE-2024-32002https://github.com/amalmurali47/hookPOC詳細
5local poc for CVE-2024-32002https://github.com/M507/CVE-2024-32002POC詳細
6CVE-2024-32002 RCE PoChttps://github.com/safebuffer/CVE-2024-32002POC詳細
7Nonehttps://github.com/10cks/CVE-2024-32002-POCPOC詳細
8Nonehttps://github.com/10cks/CVE-2024-32002-hulkPOC詳細
9Nonehttps://github.com/10cks/CVE-2024-32002-submodPOC詳細
10Nonehttps://github.com/10cks/CVE-2024-32002-smashPOC詳細
11Nonehttps://github.com/10cks/CVE-2024-32002-linux-hulkPOC詳細
12Nonehttps://github.com/10cks/CVE-2024-32002-linux-submodPOC詳細
13Nonehttps://github.com/10cks/CVE-2024-32002-linux-smashPOC詳細
14Nonehttps://github.com/aitorcastel/poc_CVE-2024-32002POC詳細
15Nonehttps://github.com/aitorcastel/poc_CVE-2024-32002_submodulePOC詳細
16CVE-2024-32002-hookhttps://github.com/10cks/hookPOC詳細
17Nonehttps://github.com/jweny/CVE-2024-32002_HOOKPOC詳細
18Nonehttps://github.com/jweny/CVE-2024-32002_EXPPOC詳細
19Nonehttps://github.com/CrackerCat/CVE-2024-32002_EXPPOC詳細
20Nonehttps://github.com/KiranKumarK20/CVE-2024-32002POC詳細
21Nonehttps://github.com/jerrydotlam/cve-2024-32002-1POC詳細
22Nonehttps://github.com/jerrydotlam/cve-2024-32002-2POC詳細
23Nonehttps://github.com/jerrydotlam/cve-2024-32002-3POC詳細
24Nonehttps://github.com/1mxml/CVE-2024-32002-pocPOC詳細
25CVE-2024-32002 hook POChttps://github.com/Roronoawjd/hookPOC詳細
26Nonehttps://github.com/JakobTheDev/cve-2024-32002-submodule-rcePOC詳細
27Nonehttps://github.com/JakobTheDev/cve-2024-32002-poc-rcePOC詳細
28CVE-2024-32002 POChttps://github.com/Roronoawjd/git_rcePOC詳細
29Este script demuestra cómo explotar la vulnerabilidad CVE-2024-32002 para obtener una reverse shell, proporcionando acceso remoto al sistema afectado. Úselo con precaución en entornos controlados y solo con fines educativos o de pruebas de seguridad.https://github.com/JJoosh/CVE-2024-32002-Reverse-ShellPOC詳細
30Nonehttps://github.com/YuanlooSec/CVE-2024-32002-pocPOC詳細
31Nonehttps://github.com/bfengj/CVE-2024-32002-hookPOC詳細
32Nonehttps://github.com/ycdxsb/CVE-2024-32002-hulkPOC詳細
33Nonehttps://github.com/ycdxsb/CVE-2024-32002-submodPOC詳細
34Nonehttps://github.com/bfengj/CVE-2024-32002-ExploitPOC詳細
35Repo for testing CVE-2024-32002https://github.com/vincepsh/CVE-2024-32002POC詳細
36CVE-2024-32002-hookhttps://github.com/vincepsh/CVE-2024-32002-hookPOC詳細
37Nonehttps://github.com/10cks/CVE-2024-32002-EXPPOC詳細
38PoC Exploit for CVE-2024-32002https://github.com/WOOOOONG/CVE-2024-32002POC詳細
39PoC Exploit for CVE-2024-32002https://github.com/WOOOOONG/hookPOC詳細
40poc of git rce using cve-2024-32002https://github.com/fadhilthomas/poc-cve-2024-32002POC詳細
41part of poc cve-2024-32002https://github.com/fadhilthomas/hookPOC詳細
42A submodule to demonstrate CVE-2024-32002. Demonstrates arbitrary write into .git.https://github.com/JakobTheDev/cve-2024-32002-submodule-awPOC詳細
43A POC for CVE-2024-32002 demonstrating arbitrary write into the .git directory.https://github.com/JakobTheDev/cve-2024-32002-poc-awPOC詳細
44Nonehttps://github.com/markuta/CVE-2024-32002POC詳細
45Nonehttps://github.com/Goplush/CVE-2024-32002-git-rcePOC詳細
46Nonehttps://github.com/TanMolk/CVE-2024-32002-subPOC詳細
47Nonehttps://github.com/TanMolk/CVE-2024-32002POC詳細
48CVE-2024-32002wakuwakuhttps://github.com/AD-Appledog/CVE-2024-32002POC詳細
49cve-2024-32002yahhhhttps://github.com/AD-Appledog/wakuwakuPOC詳細
50https://www.cve.org/CVERecord?id=CVE-2024-32002https://github.com/tobelight/cve_2024_32002POC詳細
51CVE-2024-32002 poc testhttps://github.com/431m/rcetestPOC詳細
52nonehttps://github.com/Basyaact/CVE-2024-32002-PoC_ChinesePOC詳細
53Nonehttps://github.com/alimuhammedkose/CVE-2024-32002-linux-smashPOC詳細
54Nonehttps://github.com/Hector65432/cve-2024-32002-1POC詳細
55Nonehttps://github.com/Hector65432/cve-2024-32002-2POC詳細
56exploit for CVE-2024-32002https://github.com/bonnettheo/CVE-2024-32002POC詳細
57Nonehttps://github.com/AmbroseCdMeng/CVE-2024-32002POC詳細
58Nonehttps://github.com/AmbroseCdMeng/CVE-2024-32002-HookPOC詳細
59Nonehttps://github.com/sysonlai/CVE-2024-32002-hookPOC詳細
60Nonehttps://github.com/TSY244/CVE-2024-32002-git-rce-father-pocPOC詳細
61Nonehttps://github.com/TSY244/CVE-2024-32002-git-rcePOC詳細
62Nonehttps://github.com/blackninja23/CVE-2024-32002POC詳細
63A Reverse shell generator for gitlab-shell vulnerability cve 2024-32002https://github.com/daemon-reconfig/CVE-2024-32002POC詳細
64RCE through git recursive cloning. https://github.com/HexDoesRandomShit/CVE-2024-32002POC詳細
65GIT RCE CVE-2024-32002https://github.com/charlesgargasson/CVE-2024-32002POC詳細
66PoC of CVE-2024-32002 - Remote Code Execution while cloning special-crafted local repositorieshttps://github.com/NishanthAnand21/CVE-2024-32002-PoCPOC詳細
67Just small script to exploit CVE-2024-32002https://github.com/tiyeume25112004/CVE-2024-32002POC詳細
68Nonehttps://github.com/mprunet/cve-2024-32002-maliciousPOC詳細
69Nonehttps://github.com/mprunet/cve-2024-32002-pullPOC詳細
70Nonehttps://github.com/chrisWalker11/CVE-2024-32002POC詳細
71RCE through git recursive cloning. https://github.com/h3xm4n/CVE-2024-32002POC詳細
72adapting CVE-2024-32002 for running offline and locallyhttps://github.com/chrisWalker11/running-CVE-2024-32002-locally-for-tesingPOC詳細
73POChttps://github.com/sanan2004/CVE-2024-32002POC詳細
74Nonehttps://github.com/FlojBoj/CVE-2024-32002POC詳細
75This is the main repository for CVE 2024-32002, and requires recursive cloning because it contains the submodels necessary for execution.https://github.com/JJoosh/CVE-2024-32002POC詳細
76git clone rce CVE-2024-32002https://github.com/EQSTLab/git_rcePOC詳細
77This is a demo for CVE-2024-32002 POChttps://github.com/Masamuneee/hookPOC詳細
78This is a demo for CVE-2024-32002 POChttps://github.com/Masamuneee/CVE-2024-32002-POCPOC詳細
79Proof of Concept for CVE-2024-32002https://github.com/th4s1s/CVE-2024-32002-PoCPOC詳細
80hihihihaahttps://github.com/Julian-gmz/hook_CVE-2024-32002POC詳細
81Nonehttps://github.com/grecosamuel/CVE-2024-32002POC詳細
82CVE-2024-32002 是 Git 中的一个严重漏洞,允许攻击者在用户执行 git clone 操作时远程执行任意代码(RCE)。https://github.com/XiaomingX/CVE-2024-32002-pocPOC詳細
83CVE-2024-32002 是 Git 中的一个严重漏洞,允许攻击者在用户执行 git clone 操作时远程执行任意代码(RCE)。https://github.com/XiaomingX/cve-2024-32002-pocPOC詳細
84Just small script to exploit CVE-2024-32002https://github.com/SpycioKon/CVE-2024-32002POC詳細
85An example of a repo that would make use of the CVE-2024-32002https://github.com/jolibb55/donaldPOC詳細
86Nonehttps://github.com/Katherine-song/CVE-2024-32002POC詳細
87Este script demuestra cómo explotar la vulnerabilidad CVE-2024-32002 para obtener una reverse shell, proporcionando acceso remoto al sistema afectado. Úselo con precaución en entornos controlados y solo con fines educativos o de pruebas de seguridad.https://github.com/YukaFake/CVE-2024-32002-Reverse-ShellPOC詳細
88This is the main repository for CVE 2024-32002, and requires recursive cloning because it contains the submodels necessary for execution.https://github.com/YukaFake/CVE-2024-32002POC詳細
89Repository for demonstrating CVE-2024-32002https://github.com/razenkovv/captainPOC詳細
90Repository for demonstrating CVE-2024-32002 - 2https://github.com/razenkovv/hookPOC詳細
91This repository contains a PoC for exploiting CVE-2024-32002, a vulnerability in Git that allows RCE during a git clone operation. By crafting repositories with submodules in a specific way, an attacker can exploit symlink handling on case-insensitive filesystems to write files into the .git/ directory, leading to the execution of malicious hooks.https://github.com/ashutosh0408/CVE-2024-32002POC詳細
92This repository contains a PoC for exploiting CVE-2024-32002, a vulnerability in Git that allows RCE during a git clone operation. By crafting repositories with submodules in a specific way, an attacker can exploit symlink handling on case-insensitive filesystems to write files into the .git/ directory, leading to the execution of malicious hooks.https://github.com/ashutosh0408/Cve-2024-32002-pocPOC詳細
93cve-2024-32002https://github.com/Dre4m017/fuzzyPOC詳細
94Nonehttps://github.com/JoaoLeonello/cve-2024-32002-pocPOC詳細
95Nonehttps://github.com/srakkk/cve-2024-32002-demoPOC詳細
96Nonehttps://github.com/srakkk/cve-2024-32002-hookPOC詳細
97Nonehttps://github.com/mystxcal/cve-2024-32002-demoPOC詳細
98nonehttps://github.com/BasyacatX/CVE-2024-32002-PoC_ChinesePOC詳細
99CVE-2024-32002 是 Git 中的一个严重漏洞,允许攻击者在用户执行 git clone 操作时远程执行任意代码(RCE)。https://github.com/BohemianHacks/CVE-2024-32002-pocPOC詳細
100Submodule repo for Backup Exec CVE-2024-32002 exploithttps://github.com/DayDayDayDreaming/backup-exec-hookPOC詳細
101Superproject repo for Backup Exec CVE-2024-32002 exploithttps://github.com/DayDayDayDreaming/backup-exec-cve-32002POC詳細
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2024-32002のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · git · 2024-05-14 · 5 CVEs total

CVE-2024-320048.2 HIGHGit vulnerable to Remote Code Execution while cloning special-crafted local repositories
CVE-2024-324657.4 HIGHGit's protections for cloning untrusted repositories can be bypassed
CVE-2024-320203.9 LOWCloning local Git repository by untrusted user allows the untrusted user to modify objects
CVE-2024-320213.9 LOWLocal Git clone may hardlink arbitrary user-readable files into the new repository's "obje

IV. 関連脆弱性

V. CVE-2024-32002へのコメント

まだコメントはありません


コメントを残す