First published: Mon Dec 09 2019(Updated: )
An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. Recursive clones are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/git | 1:2.20.1-2+deb10u3 1:2.20.1-2+deb10u8 1:2.30.2-1+deb11u2 1:2.39.2-1.1 1:2.42.0-1 | |
redhat/git | <2.24.1 | 2.24.1 |
redhat/git | <2.23.1 | 2.23.1 |
redhat/git | <2.21.1 | 2.21.1 |
redhat/git | <2.20.2 | 2.20.2 |
redhat/git | <2.19.3 | 2.19.3 |
redhat/git | <2.18.2 | 2.18.2 |
redhat/git | <2.17.3 | 2.17.3 |
redhat/git | <2.16.6 | 2.16.6 |
redhat/git | <2.15.4 | 2.15.4 |
redhat/git | <2.14.6 | 2.14.6 |
Git Git-shell | >=2.14.0<2.14.6 | |
Git Git-shell | >=2.15.0<2.15.4 | |
Git Git-shell | >=2.16.0<2.16.6 | |
Git Git-shell | >=2.17.0<2.17.3 | |
Git Git-shell | >=2.18.0<2.18.2 | |
Git Git-shell | >=2.19.0<2.19.3 | |
Git Git-shell | >=2.20.0<2.20.2 | |
Git Git-shell | >=2.22.0<2.22.2 | |
Git Git-shell | =2.21.0 | |
Git Git-shell | =2.23.0 | |
Git Git-shell | =2.24.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-1387 is high (8.8).
The vulnerability CVE-2019-1387 affects Git versions before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6.
The vulnerability CVE-2019-1387 is caused by too-lax validation of submodule names in Git, allowing targeted attacks via remote code execution.
To fix the vulnerability CVE-2019-1387, users should update Git to versions v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, or v2.14.6.
More information about the vulnerability CVE-2019-1387 can be found at the following references: [link1], [link2], [link3].