Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-32021— Local Git clone may hardlink arbitrary user-readable files into the new repository's "objects/" directory

CVSS 3.9 · Low EPSS 0.02% · P6
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-32021

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Local Git clone may hardlink arbitrary user-readable files into the new repository's "objects/" directory
Source: NVD (National Vulnerability Database)
Vulnerability Description
Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, when cloning a local source repository that contains symlinks via the filesystem, Git may create hardlinks to arbitrary user-readable files on the same filesystem as the target repository in the `objects/` directory. Cloning a local repository over the filesystem may creating hardlinks to arbitrary user-owned files on the same filesystem in the target Git repository's `objects/` directory. When cloning a repository over the filesystem (without explicitly specifying the `file://` protocol or `--no-local`), the optimizations for local cloning will be used, which include attempting to hard link the object files instead of copying them. While the code includes checks against symbolic links in the source repository, which were added during the fix for CVE-2022-39253, these checks can still be raced because the hard link operation ultimately follows symlinks. If the object on the filesystem appears as a file during the check, and then a symlink during the operation, this will allow the adversary to bypass the check and create hardlinks in the destination objects directory to arbitrary, user-readable files. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用硬编码、安全相关的常数
Source: NVD (National Vulnerability Database)
Vulnerability Title
Git 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Git是一套免费、开源的分布式版本控制系统。 Git存在安全漏洞,该漏洞源于本地克隆可以将任意用户可读文件硬链接到新存储库的对象目录中。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
gitgit = 2.45.0 -

II. Public POCs for CVE-2024-32021

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-32021

登录查看更多情报信息。

Same Patch Batch · git · 2024-05-14 · 5 CVEs total

CVE-2024-320029.1 CRITICALGit's recursive clones on case-insensitive filesystems that support symlinks are susceptib
CVE-2024-320048.2 HIGHGit vulnerable to Remote Code Execution while cloning special-crafted local repositories
CVE-2024-324657.4 HIGHGit's protections for cloning untrusted repositories can be bypassed
CVE-2024-320203.9 LOWCloning local Git repository by untrusted user allows the untrusted user to modify objects

IV. Related Vulnerabilities

V. Comments for CVE-2024-32021

No comments yet


Leave a comment