← Retour aux CVEs
CVE-2023-29012
HIGH7.2
Description
Git for Windows is the Windows port of Git. Prior to version 2.40.1, any user of Git CMD who starts the command in an untrusted directory is impacted by an Uncontrolles Search Path Element vulnerability. Maliciously-placed `doskey.exe` would be executed silently upon running Git CMD. The problem has been patched in Git for Windows v2.40.1. As a workaround, avoid using Git CMD or, if using Git CMD, avoid starting it in an untrusted directory.
Details CVE
Score CVSS v3.17.2
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
Vecteur d'attaqueLOCAL
ComplexiteHIGH
Privileges requisHIGH
Interaction utilisateurREQUIRED
Publie4/25/2023
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
git_for_windows_project:git_for_windows
Faiblesses (CWE)
CWE-427
References
https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1(security-advisories@github.com)
https://github.com/git-for-windows/git/security/advisories/GHSA-gq5x-v87v-8f7g(security-advisories@github.com)
https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/git-for-windows/git/security/advisories/GHSA-gq5x-v87v-8f7g(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.