CVE-2023-29007

Severity
7.8HIGH
EPSS
0.8%
top 25.54%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 25
Latest updateJul 15

Description

Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted `.gitmodules` file with submodule URLs that are longer than 1024 characters can used to exploit a bug in `config.c::git_config_copy_or_rename_section_in_file()`. This bug can be used to inject arbitrary configuration into a user's `$GIT_DIR/config` when attempting to remove the configuration section associated with that submodule. Whe

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages4 packages

CVEListV5git/git< 2.30.9+10
NVDgit-scm/git2.31.02.31.8+10
Debiangit< 1:2.30.2-1+deb11u3+3
Ubuntugit< 1:2.7.4-0ubuntu1.10+esm7

Also affects: Fedora 36, 37, 38

Patches

🔴Vulnerability Details

4
OSV
git vulnerabilities2023-05-17
OSV
git vulnerabilities2023-05-01
OSV
CVE-2023-29007: Git is a revision control system2023-04-25
CVEList
Arbitrary configuration injection via `git submodule deinit`2023-04-25

📋Vendor Advisories

6
Oracle
Oracle Oracle Communications Risk Matrix: Virtual Network Function Manager (git) — CVE-2023-290072023-07-15
Microsoft
GitHub: CVE-2023-29007 Arbitrary configuration injection via `git submodule deinit`2023-06-13
Ubuntu
Git vulnerabilities2023-05-17
Ubuntu
Git vulnerabilities2023-05-01
Red Hat
git: arbitrary configuration injection when renaming or deleting a section from a configuration file2023-04-25