CVE-2023-29011

CWE-427CWE-233 documents3 sources
Severity
7.8HIGH
EPSS
0.1%
top 75.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 25
Latest updateJun 13

Description

Git for Windows, the Windows port of Git, ships with an executable called `connect.exe`, which implements a SOCKS5 proxy that can be used to connect e.g. to SSH servers via proxies when certain ports are blocked for outgoing connections. The location of `connect.exe`'s config file is hard-coded as `/etc/connectrc` which will typically be interpreted as `C:\etc\connectrc`. Since `C:\etc` can be created by any authenticated user, this makes `connect.exe` susceptible to malicious files being placed

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:HExploitability: 0.8 | Impact: 6.0

Affected Packages2 packages

CVEListV5git-for-windows/git< 2.40.1
NVDgit< 2.40.1

🔴Vulnerability Details

1
CVEList
Git for Windows's config file of `connect.exe` is susceptible to malicious placing2023-04-25

📋Vendor Advisories

1
Microsoft
GitHub: CVE-2023-29011 The config file of `connect.exe` is susceptible to malicious placing2023-06-13