CVE-2023-4759 — Link Following in Jgit
Severity
8.8HIGHNVD
EPSS
1.0%
top 23.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 12
Latest updateOct 15
Description
Arbitrary File Overwrite in Eclipse JGit <= 6.6.0
In Eclipse JGit, all versions <= 6.6.0.202305301015-r, a symbolic link present in a specially crafted git repository can be used to write a file to locations outside the working tree when this repository is cloned with JGit to a case-insensitive filesystem, or when a checkout from a clone of such a repository is performed on a case-insensitive filesystem.
This can happen on checkout (DirCacheCheckout), merge (ResolveMerger via its WorkingTreeUp…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages3 packages
Patches
🔴Vulnerability Details
4📋Vendor Advisories
4Oracle▶
Oracle Oracle Fusion Middleware Risk Matrix: Centralized Thirdparty Jars (Eclipse JGit) — CVE-2023-4759↗2024-10-15
Oracle▶
Oracle Oracle Fusion Middleware Risk Matrix: NextGen Installer (Eclipse JGit) — CVE-2023-4759↗2024-07-15
Debian▶
CVE-2023-4759: jgit - Arbitrary File Overwrite in Eclipse JGit <= 6.6.0 In Eclipse JGit, all versions...↗2023