CVE-2020-5260 — Improper Input Validation in GIT
CWE-20 — Improper Input ValidationCWE-522 — Insufficiently Protected CredentialsCWE-79 — Cross-site ScriptingCWE-116 — Improper Encoding or Escaping of OutputCWE-147 — Improper Neutralization of Input TerminatorsCWE-150 — Improper Neutralization of Escape, Meta, or Control Sequences12 documents8 sources
Severity
7.5HIGHNVD
CNA9.3
EPSS
32.5%
top 3.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 14
Latest updateJan 14
Description
Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that contain an encoded newline can inject unintended values into the credential helper protocol stream, causing the credential helper to retrieve the password for one server (e.g.…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages5 packages
Also affects: Debian Linux 10.0, 8.0, 9.0, Fedora 30, 31, 32, Ubuntu Linux 16.04, 18.04, 19.10
Patches
🔴Vulnerability Details
2📋Vendor Advisories
5Red Hat
▶
Juniper▶
CVE-2020-1673: Insufficient Cross-Site Scripting (XSS) protection in Juniper Networks J-Web and web based (HTTP/HTTPS) services allows an unauthenticated attacker to↗2020-10-16
Debian▶
CVE-2020-5260: git - Affected versions of Git have a vulnerability whereby Git can be tricked into se...↗2020