Skip to content

Latest commit

 

History

History
53 lines (37 loc) · 1.97 KB

File metadata and controls

53 lines (37 loc) · 1.97 KB
sidebar_label title description hide_table_of_contents sidebar_class_name toc_max_heading_level tags
CVE-2024-32002
CVE-2024-32002
Lifecycle of CVE-2024-32002
true
hide-from-sidebar
2
security
cve

CVE Details

CVE-2024-32002

Last Update

10/10/2024

NIST CVE Summary

Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, repositories with submodules can be crafted in a way that exploits a bug in Git whereby it can be fooled into writing files not into the submodule's worktree but into a .git/ directory. This allows writing a hook that will be executed while the clone operation is still active, giving the user no opportunity to inspect the code that is being executed. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. If symbolic link support is disabled in Git (e.g. via git config --global core.symlinks false), the described attack won't work. As always, it is best to avoid cloning repositories from untrusted sources.

Our Official Summary

A critical vulnerability in Git has recently been published that could lead to remote command injection. The exploitation occurs when the victim clones a malicious repository recursively, which would execute hooks contained in the submodules. The vulnerability lies in the way Git handles symbolic links in repository submodules. There are currently several PoCs with public exploits that expose the vulnerability. This risk of this vulnerability exploited in spectrocloud products is very low.

CVE Severity

9.0

Status

Ongoing

Affected Products & Versions

  • Palette Enterprise airgap 4.4.18

Revision History

  • 1.0 09/15/2024 Initial Publication
  • 2.0 09/15/2024 Added Palette Enterprise airgap 4.4.18 to Affected Products
  • 3.0 10/10/2024 CVE remediated in Palette Enterprise airgap 4.5.3