7.3
CWE
706
Advisory Published
Updated

CVE-2020-26233: Remote Code Execution in Git Credential Manager Core

First published: Tue Dec 08 2020(Updated: )

Git Credential Manager Core (GCM Core) is a secure Git credential helper built on .NET Core that runs on Windows and macOS. In Git Credential Manager Core before version 2.0.289, when recursively cloning a Git repository on Windows with submodules, Git will first clone the top-level repository and then recursively clone all submodules by starting new Git processes from the top-level working directory. If a malicious git.exe executable is present in the top-level repository then this binary will be started by Git Credential Manager Core when attempting to read configuration, and not git.exe as found on the %PATH%. This only affects GCM Core on Windows, not macOS or Linux-based distributions. GCM Core version 2.0.289 contains the fix for this vulnerability, and is available from the project's GitHub releases page. GCM Core 2.0.289 is also bundled in the latest Git for Windows release; version 2.29.2(3). As a workaround, users should avoid recursively cloning untrusted repositories with the --recurse-submodules option.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Microsoft Git Credential Manager<2.0.289

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2020-26233?

    CVE-2020-26233 is a vulnerability in Git Credential Manager Core (GCM Core) that allows for remote code execution when recursively cloning a Git repository on Windows with submodules.

  • What is Git Credential Manager Core (GCM Core)?

    Git Credential Manager Core (GCM Core) is a secure Git credential helper built on .NET Core that runs on Windows and macOS.

  • How does CVE-2020-26233 impact Windows?

    CVE-2020-26233 impacts Windows by allowing an attacker to execute remote code when recursively cloning a Git repository with submodules.

  • How can I fix the CVE-2020-26233 vulnerability?

    To fix the CVE-2020-26233 vulnerability, you should update Git Credential Manager Core to version 2.0.289 or later.

  • Where can I find more information about CVE-2020-26233?

    More information about CVE-2020-26233 can be found in the references provided: https://blog.blazeinfosec.com/attack-of-the-clones-2-git-command-client-remote-code-execution-strikes-back/, https://git-scm.com/docs/git-clone#Documentation/git-clone.txt---recurse-submodulesltpathspecgt, https://github.com/microsoft/Git-Credential-Manager-Core/commit/61c0388e064babb3b4e60d3ec269e8a07ab3bc76

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203