CVE-2019-1352
Severity
8.8HIGH
EPSS
11.0%
top 6.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 24
Latest updateMay 24
Description
A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1354, CVE-2019-1387.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages7 packages
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-74fq-3g57-65f7: A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution V↗2022-05-24
CVEList▶
CVE-2019-1352: A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution V↗2020-01-24
OSV▶
CVE-2019-1352: A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution V↗2020-01-24
📋Vendor Advisories
8💬Community
4Bugzilla▶
CVE-2020-12278 libgit2: files inside the .git directory may be overwritten during cloning via NTFS Alternate Data Streams↗2020-04-29
Bugzilla▶
CVE-2019-1352 git: Files inside the .git directory may be overwritten during cloning via NTFS Alternate Data Streams [fedora-all]↗2019-12-11
Bugzilla▶
CVE-2019-1352 git: Files inside the .git directory may be overwritten during cloning via NTFS Alternate Data Streams↗2019-12-11
Bugzilla▶
CVE-2019-1349 git: Recursive submodule cloning allows using git directory twice with synonymous directory name written in .git/↗2019-12-09