Git is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called "sideband channel". These messages will be prefixed with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information, or to mislead the user into executing untrusted scripts. As requested on the git-security mailing list, the patches are under discussion on the public mailing list. Users are advised to update as soon as possible. Users unable to upgrade should avoid recursive clones unless they are from trusted sources.
Metrics
Affected Vendors & Products
References
History
Wed, 15 Jan 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 15 Jan 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Git is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called "sideband channel". These messages will be prefixed with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information, or to mislead the user into executing untrusted scripts. As requested on the git-security mailing list, the patches are under discussion on the public mailing list. Users are advised to update as soon as possible. Users unable to upgrade should avoid recursive clones unless they are from trusted sources. | |
Title | The sideband payload is passed unfiltered to the terminal in git | |
Weaknesses | CWE-116 CWE-150 |
|
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-01-15T17:35:02.379Z
Updated: 2025-01-15T20:10:36.473Z
Reserved: 2024-11-04T17:46:16.779Z
Link: CVE-2024-52005
Vulnrichment
Updated: 2025-01-15T20:07:51.559Z
NVD
Status : Received
Published: 2025-01-15T18:15:24.130
Modified: 2025-01-15T18:15:24.130
Link: CVE-2024-52005
Redhat
No data.