Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23193 | GitProxy Backfile Parsing Exploit |
Github GHSA |
GHSA-xxmh-rf63-qwjv | GitProxy Backfile Parsing Exploit |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 01 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Finos gitproxy
|
|
| CPEs | cpe:2.3:a:finos:gitproxy:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Finos gitproxy
|
|
| Metrics |
cvssV3_1
|
Thu, 31 Jul 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Finos
Finos git-proxy |
|
| Vendors & Products |
Finos
Finos git-proxy |
Wed, 30 Jul 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 30 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GitProxy is an application that stands between developers and a Git remote endpoint (e.g., github.com). In versions 1.19.1 and below, an attacker can craft a malicious Git packfile to exploit the PACK signature detection in the parsePush.ts file. By embedding a misleading PACK signature within commit content and carefully constructing the packet structure, the attacker can trick the parser into treating invalid or unintended data as the packfile. Potentially, this would allow bypassing approval or hiding commits. This issue is fixed in version 1.19.2. | |
| Title | GitProxy is vulnerable to a packfile parsing exploit | |
| Weaknesses | CWE-115 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-07-30T20:19:21.613Z
Reserved: 2025-07-25T16:19:16.093Z
Link: CVE-2025-54584
Updated: 2025-07-30T20:19:11.836Z
Status : Analyzed
Published: 2025-07-30T20:15:38.357
Modified: 2025-08-01T20:04:28.420
Link: CVE-2025-54584
No data.
OpenCVE Enrichment
Updated: 2025-07-31T10:09:12Z
EUVD
Github GHSA