CVE-2021-29468
Vulnerability from cvelistv5
Published
2021-04-29 20:35
Modified
2024-08-03 22:11
Severity ?
EPSS score ?
Summary
Cygwin Git is a patch set for the git command line tool for the cygwin environment. A specially crafted repository that contains symbolic links as well as files with backslash characters in the file name may cause just-checked out code to be executed while checking out a repository using Git on Cygwin. The problem will be patched in the Cygwin Git v2.31.1-2 release. At time of writing, the vulnerability is present in the upstream Git source code; any Cygwin user who compiles Git for themselves from upstream sources should manually apply a patch to mitigate the vulnerability. As mitigation users should not clone or pull from repositories from untrusted sources. CVE-2019-1354 was an equivalent vulnerability in Git for Visual Studio.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | me-and | Cygwin-Git |
Version: < 2.31.1-2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:11:05.331Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/me-and/Cygwin-Git/security/advisories/GHSA-rmp3-wq55-f557" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/me-and/Cygwin-Git/blob/main/check-backslash-safety.patch" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cygwin.com/pipermail/cygwin-announce/2021-April/010018.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lore.kernel.org/git/CA+kUOa=juEdBMVr_gyTKjz7PkPt2DZHkXQyzcQmAWCsEHC_ssw%40mail.gmail.com/T/#u" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cygwin-Git", "vendor": "me-and", "versions": [ { "status": "affected", "version": "\u003c 2.31.1-2" } ] } ], "descriptions": [ { "lang": "en", "value": "Cygwin Git is a patch set for the git command line tool for the cygwin environment. A specially crafted repository that contains symbolic links as well as files with backslash characters in the file name may cause just-checked out code to be executed while checking out a repository using Git on Cygwin. The problem will be patched in the Cygwin Git v2.31.1-2 release. At time of writing, the vulnerability is present in the upstream Git source code; any Cygwin user who compiles Git for themselves from upstream sources should manually apply a patch to mitigate the vulnerability. As mitigation users should not clone or pull from repositories from untrusted sources. CVE-2019-1354 was an equivalent vulnerability in Git for Visual Studio." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation ", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-29T20:35:20", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/me-and/Cygwin-Git/security/advisories/GHSA-rmp3-wq55-f557" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/me-and/Cygwin-Git/blob/main/check-backslash-safety.patch" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cygwin.com/pipermail/cygwin-announce/2021-April/010018.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lore.kernel.org/git/CA+kUOa=juEdBMVr_gyTKjz7PkPt2DZHkXQyzcQmAWCsEHC_ssw%40mail.gmail.com/T/#u" } ], "source": { "advisory": "GHSA-rmp3-wq55-f557", "discovery": "UNKNOWN" }, "title": "Arbitrary code execution when checking out an attacker-controlled Git branch", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-29468", "STATE": "PUBLIC", "TITLE": "Arbitrary code execution when checking out an attacker-controlled Git branch" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cygwin-Git", "version": { "version_data": [ { "version_value": "\u003c 2.31.1-2" } ] } } ] }, "vendor_name": "me-and" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cygwin Git is a patch set for the git command line tool for the cygwin environment. A specially crafted repository that contains symbolic links as well as files with backslash characters in the file name may cause just-checked out code to be executed while checking out a repository using Git on Cygwin. The problem will be patched in the Cygwin Git v2.31.1-2 release. At time of writing, the vulnerability is present in the upstream Git source code; any Cygwin user who compiles Git for themselves from upstream sources should manually apply a patch to mitigate the vulnerability. As mitigation users should not clone or pull from repositories from untrusted sources. CVE-2019-1354 was an equivalent vulnerability in Git for Visual Studio." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20: Improper Input Validation " } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/me-and/Cygwin-Git/security/advisories/GHSA-rmp3-wq55-f557", "refsource": "CONFIRM", "url": "https://github.com/me-and/Cygwin-Git/security/advisories/GHSA-rmp3-wq55-f557" }, { "name": "https://github.com/me-and/Cygwin-Git/blob/main/check-backslash-safety.patch", "refsource": "MISC", "url": "https://github.com/me-and/Cygwin-Git/blob/main/check-backslash-safety.patch" }, { "name": "https://cygwin.com/pipermail/cygwin-announce/2021-April/010018.html", "refsource": "MISC", "url": "https://cygwin.com/pipermail/cygwin-announce/2021-April/010018.html" }, { "name": "https://lore.kernel.org/git/CA+kUOa=juEdBMVr_gyTKjz7PkPt2DZHkXQyzcQmAWCsEHC_ssw@mail.gmail.com/T/#u", "refsource": "MISC", "url": "https://lore.kernel.org/git/CA+kUOa=juEdBMVr_gyTKjz7PkPt2DZHkXQyzcQmAWCsEHC_ssw@mail.gmail.com/T/#u" } ] }, "source": { "advisory": "GHSA-rmp3-wq55-f557", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-29468", "datePublished": "2021-04-29T20:35:20", "dateReserved": "2021-03-30T00:00:00", "dateUpdated": "2024-08-03T22:11:05.331Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-29468\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2021-04-29T21:15:08.550\",\"lastModified\":\"2024-11-21T06:01:10.790\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cygwin Git is a patch set for the git command line tool for the cygwin environment. A specially crafted repository that contains symbolic links as well as files with backslash characters in the file name may cause just-checked out code to be executed while checking out a repository using Git on Cygwin. The problem will be patched in the Cygwin Git v2.31.1-2 release. At time of writing, the vulnerability is present in the upstream Git source code; any Cygwin user who compiles Git for themselves from upstream sources should manually apply a patch to mitigate the vulnerability. As mitigation users should not clone or pull from repositories from untrusted sources. CVE-2019-1354 was an equivalent vulnerability in Git for Visual Studio.\"},{\"lang\":\"es\",\"value\":\"Cygwin Git es un conjunto de parches para la herramienta de l\u00ednea de comandos git para el entorno cygwin.\u0026#xa0;Un repositorio especialmente dise\u00f1ado que contiene enlaces simb\u00f3licos, as\u00ed como archivos con caracteres de backslash en el nombre del archivo, puede hacer que se ejecute el c\u00f3digo reci\u00e9n extra\u00eddo al comprobar un repositorio usando Git en Cygwin.\u0026#xa0;El problema se parchear\u00e1 en Cygwin Git versi\u00f3n v2.31.1-2.\u0026#xa0;En el momento de escribir este art\u00edculo, la vulnerabilidad est\u00e1 presente aguas arriba del c\u00f3digo fuente de Git;\u0026#xa0;Cualquier usuario de Cygwin que compile Git por s\u00ed mismo desde fuentes ascendentes debe aplicar manualmente un parche para mitigar la vulnerabilidad.\u0026#xa0;Como mitigaci\u00f3n, los usuarios no deben clonar ni extraer de repositorios de fuentes que no sean confiables.\u0026#xa0;CVE-2019-1354 era una vulnerabilidad equivalente en Git para Visual Studio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cygwin:git:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.31.1-1\",\"matchCriteriaId\":\"966B34C6-5223-4E8C-B286-069B97E5FEAF\"}]}]}],\"references\":[{\"url\":\"https://cygwin.com/pipermail/cygwin-announce/2021-April/010018.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/me-and/Cygwin-Git/blob/main/check-backslash-safety.patch\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/me-and/Cygwin-Git/security/advisories/GHSA-rmp3-wq55-f557\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lore.kernel.org/git/CA+kUOa=juEdBMVr_gyTKjz7PkPt2DZHkXQyzcQmAWCsEHC_ssw%40mail.gmail.com/T/#u\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://cygwin.com/pipermail/cygwin-announce/2021-April/010018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/me-and/Cygwin-Git/blob/main/check-backslash-safety.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/me-and/Cygwin-Git/security/advisories/GHSA-rmp3-wq55-f557\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lore.kernel.org/git/CA+kUOa=juEdBMVr_gyTKjz7PkPt2DZHkXQyzcQmAWCsEHC_ssw%40mail.gmail.com/T/#u\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.