CVE-2021-29468 (GCVE-0-2021-29468)
Vulnerability from cvelistv5 – Published: 2021-04-29 20:35 – Updated: 2024-08-03 22:11
VLAI?
Title
Arbitrary code execution when checking out an attacker-controlled Git branch
Summary
Cygwin Git is a patch set for the git command line tool for the cygwin environment. A specially crafted repository that contains symbolic links as well as files with backslash characters in the file name may cause just-checked out code to be executed while checking out a repository using Git on Cygwin. The problem will be patched in the Cygwin Git v2.31.1-2 release. At time of writing, the vulnerability is present in the upstream Git source code; any Cygwin user who compiles Git for themselves from upstream sources should manually apply a patch to mitigate the vulnerability. As mitigation users should not clone or pull from repositories from untrusted sources. CVE-2019-1354 was an equivalent vulnerability in Git for Visual Studio.
Severity ?
8.8 (High)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| me-and | Cygwin-Git |
Affected:
< 2.31.1-2
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:11:05.331Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/me-and/Cygwin-Git/security/advisories/GHSA-rmp3-wq55-f557"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/me-and/Cygwin-Git/blob/main/check-backslash-safety.patch"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://cygwin.com/pipermail/cygwin-announce/2021-April/010018.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://lore.kernel.org/git/CA+kUOa=juEdBMVr_gyTKjz7PkPt2DZHkXQyzcQmAWCsEHC_ssw%40mail.gmail.com/T/#u"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Cygwin-Git",
"vendor": "me-and",
"versions": [
{
"status": "affected",
"version": "\u003c 2.31.1-2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cygwin Git is a patch set for the git command line tool for the cygwin environment. A specially crafted repository that contains symbolic links as well as files with backslash characters in the file name may cause just-checked out code to be executed while checking out a repository using Git on Cygwin. The problem will be patched in the Cygwin Git v2.31.1-2 release. At time of writing, the vulnerability is present in the upstream Git source code; any Cygwin user who compiles Git for themselves from upstream sources should manually apply a patch to mitigate the vulnerability. As mitigation users should not clone or pull from repositories from untrusted sources. CVE-2019-1354 was an equivalent vulnerability in Git for Visual Studio."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation ",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-04-29T20:35:20",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/me-and/Cygwin-Git/security/advisories/GHSA-rmp3-wq55-f557"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/me-and/Cygwin-Git/blob/main/check-backslash-safety.patch"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://cygwin.com/pipermail/cygwin-announce/2021-April/010018.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://lore.kernel.org/git/CA+kUOa=juEdBMVr_gyTKjz7PkPt2DZHkXQyzcQmAWCsEHC_ssw%40mail.gmail.com/T/#u"
}
],
"source": {
"advisory": "GHSA-rmp3-wq55-f557",
"discovery": "UNKNOWN"
},
"title": "Arbitrary code execution when checking out an attacker-controlled Git branch",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2021-29468",
"STATE": "PUBLIC",
"TITLE": "Arbitrary code execution when checking out an attacker-controlled Git branch"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cygwin-Git",
"version": {
"version_data": [
{
"version_value": "\u003c 2.31.1-2"
}
]
}
}
]
},
"vendor_name": "me-and"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cygwin Git is a patch set for the git command line tool for the cygwin environment. A specially crafted repository that contains symbolic links as well as files with backslash characters in the file name may cause just-checked out code to be executed while checking out a repository using Git on Cygwin. The problem will be patched in the Cygwin Git v2.31.1-2 release. At time of writing, the vulnerability is present in the upstream Git source code; any Cygwin user who compiles Git for themselves from upstream sources should manually apply a patch to mitigate the vulnerability. As mitigation users should not clone or pull from repositories from untrusted sources. CVE-2019-1354 was an equivalent vulnerability in Git for Visual Studio."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20: Improper Input Validation "
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/me-and/Cygwin-Git/security/advisories/GHSA-rmp3-wq55-f557",
"refsource": "CONFIRM",
"url": "https://github.com/me-and/Cygwin-Git/security/advisories/GHSA-rmp3-wq55-f557"
},
{
"name": "https://github.com/me-and/Cygwin-Git/blob/main/check-backslash-safety.patch",
"refsource": "MISC",
"url": "https://github.com/me-and/Cygwin-Git/blob/main/check-backslash-safety.patch"
},
{
"name": "https://cygwin.com/pipermail/cygwin-announce/2021-April/010018.html",
"refsource": "MISC",
"url": "https://cygwin.com/pipermail/cygwin-announce/2021-April/010018.html"
},
{
"name": "https://lore.kernel.org/git/CA+kUOa=juEdBMVr_gyTKjz7PkPt2DZHkXQyzcQmAWCsEHC_ssw@mail.gmail.com/T/#u",
"refsource": "MISC",
"url": "https://lore.kernel.org/git/CA+kUOa=juEdBMVr_gyTKjz7PkPt2DZHkXQyzcQmAWCsEHC_ssw@mail.gmail.com/T/#u"
}
]
},
"source": {
"advisory": "GHSA-rmp3-wq55-f557",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2021-29468",
"datePublished": "2021-04-29T20:35:20",
"dateReserved": "2021-03-30T00:00:00",
"dateUpdated": "2024-08-03T22:11:05.331Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cygwin:git:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.31.1-1\", \"matchCriteriaId\": \"966B34C6-5223-4E8C-B286-069B97E5FEAF\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Cygwin Git is a patch set for the git command line tool for the cygwin environment. A specially crafted repository that contains symbolic links as well as files with backslash characters in the file name may cause just-checked out code to be executed while checking out a repository using Git on Cygwin. The problem will be patched in the Cygwin Git v2.31.1-2 release. At time of writing, the vulnerability is present in the upstream Git source code; any Cygwin user who compiles Git for themselves from upstream sources should manually apply a patch to mitigate the vulnerability. As mitigation users should not clone or pull from repositories from untrusted sources. CVE-2019-1354 was an equivalent vulnerability in Git for Visual Studio.\"}, {\"lang\": \"es\", \"value\": \"Cygwin Git es un conjunto de parches para la herramienta de l\\u00ednea de comandos git para el entorno cygwin.\u0026#xa0;Un repositorio especialmente dise\\u00f1ado que contiene enlaces simb\\u00f3licos, as\\u00ed como archivos con caracteres de backslash en el nombre del archivo, puede hacer que se ejecute el c\\u00f3digo reci\\u00e9n extra\\u00eddo al comprobar un repositorio usando Git en Cygwin.\u0026#xa0;El problema se parchear\\u00e1 en Cygwin Git versi\\u00f3n v2.31.1-2.\u0026#xa0;En el momento de escribir este art\\u00edculo, la vulnerabilidad est\\u00e1 presente aguas arriba del c\\u00f3digo fuente de Git;\u0026#xa0;Cualquier usuario de Cygwin que compile Git por s\\u00ed mismo desde fuentes ascendentes debe aplicar manualmente un parche para mitigar la vulnerabilidad.\u0026#xa0;Como mitigaci\\u00f3n, los usuarios no deben clonar ni extraer de repositorios de fuentes que no sean confiables.\u0026#xa0;CVE-2019-1354 era una vulnerabilidad equivalente en Git para Visual Studio.\"}]",
"id": "CVE-2021-29468",
"lastModified": "2024-11-21T06:01:10.790",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2021-04-29T21:15:08.550",
"references": "[{\"url\": \"https://cygwin.com/pipermail/cygwin-announce/2021-April/010018.html\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Mailing List\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/me-and/Cygwin-Git/blob/main/check-backslash-safety.patch\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/me-and/Cygwin-Git/security/advisories/GHSA-rmp3-wq55-f557\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lore.kernel.org/git/CA+kUOa=juEdBMVr_gyTKjz7PkPt2DZHkXQyzcQmAWCsEHC_ssw%40mail.gmail.com/T/#u\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://cygwin.com/pipermail/cygwin-announce/2021-April/010018.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/me-and/Cygwin-Git/blob/main/check-backslash-safety.patch\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/me-and/Cygwin-Git/security/advisories/GHSA-rmp3-wq55-f557\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lore.kernel.org/git/CA+kUOa=juEdBMVr_gyTKjz7PkPt2DZHkXQyzcQmAWCsEHC_ssw%40mail.gmail.com/T/#u\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-29468\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2021-04-29T21:15:08.550\",\"lastModified\":\"2024-11-21T06:01:10.790\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cygwin Git is a patch set for the git command line tool for the cygwin environment. A specially crafted repository that contains symbolic links as well as files with backslash characters in the file name may cause just-checked out code to be executed while checking out a repository using Git on Cygwin. The problem will be patched in the Cygwin Git v2.31.1-2 release. At time of writing, the vulnerability is present in the upstream Git source code; any Cygwin user who compiles Git for themselves from upstream sources should manually apply a patch to mitigate the vulnerability. As mitigation users should not clone or pull from repositories from untrusted sources. CVE-2019-1354 was an equivalent vulnerability in Git for Visual Studio.\"},{\"lang\":\"es\",\"value\":\"Cygwin Git es un conjunto de parches para la herramienta de l\u00ednea de comandos git para el entorno cygwin.\u0026#xa0;Un repositorio especialmente dise\u00f1ado que contiene enlaces simb\u00f3licos, as\u00ed como archivos con caracteres de backslash en el nombre del archivo, puede hacer que se ejecute el c\u00f3digo reci\u00e9n extra\u00eddo al comprobar un repositorio usando Git en Cygwin.\u0026#xa0;El problema se parchear\u00e1 en Cygwin Git versi\u00f3n v2.31.1-2.\u0026#xa0;En el momento de escribir este art\u00edculo, la vulnerabilidad est\u00e1 presente aguas arriba del c\u00f3digo fuente de Git;\u0026#xa0;Cualquier usuario de Cygwin que compile Git por s\u00ed mismo desde fuentes ascendentes debe aplicar manualmente un parche para mitigar la vulnerabilidad.\u0026#xa0;Como mitigaci\u00f3n, los usuarios no deben clonar ni extraer de repositorios de fuentes que no sean confiables.\u0026#xa0;CVE-2019-1354 era una vulnerabilidad equivalente en Git para Visual Studio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cygwin:git:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.31.1-1\",\"matchCriteriaId\":\"966B34C6-5223-4E8C-B286-069B97E5FEAF\"}]}]}],\"references\":[{\"url\":\"https://cygwin.com/pipermail/cygwin-announce/2021-April/010018.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/me-and/Cygwin-Git/blob/main/check-backslash-safety.patch\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/me-and/Cygwin-Git/security/advisories/GHSA-rmp3-wq55-f557\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lore.kernel.org/git/CA+kUOa=juEdBMVr_gyTKjz7PkPt2DZHkXQyzcQmAWCsEHC_ssw%40mail.gmail.com/T/#u\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://cygwin.com/pipermail/cygwin-announce/2021-April/010018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/me-and/Cygwin-Git/blob/main/check-backslash-safety.patch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/me-and/Cygwin-Git/security/advisories/GHSA-rmp3-wq55-f557\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lore.kernel.org/git/CA+kUOa=juEdBMVr_gyTKjz7PkPt2DZHkXQyzcQmAWCsEHC_ssw%40mail.gmail.com/T/#u\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…