First published: Tue Feb 14 2023(Updated: )
Git for Windows is the Windows port of the revision control system Git. Prior to Git for Windows version 2.39.2, when `gitk` is run on Windows, it potentially runs executables from the current directory inadvertently, which can be exploited with some social engineering to trick users into running untrusted code. A patch is available in version 2.39.2. As a workaround, avoid using `gitk` (or Git GUI's "Visualize History" functionality) in clones of untrusted repositories.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Visual Studio 2017 (includes 15.0 - 15.8) | =15.9 | |
Microsoft Visual Studio 2019 (includes 16.0 - 16.10) | =16.11 | |
Microsoft Visual Studio 2022 | =17.5 | |
Microsoft Visual Studio 2022 | =17.2 | |
Microsoft Visual Studio 2022 | =17.0 | |
Git For Windows Project Git For Windows | <2.39.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23618 is a Git for Windows Remote Code Execution Vulnerability.
Users of Microsoft Visual Studio 2017, 2019, and 2022 are affected by CVE-2023-23618.
CVE-2023-23618 has a severity level of high (7 out of 10).
You can fix CVE-2023-23618 in Visual Studio 2022 version 17.5 by applying the patch provided by Microsoft. You can download the patch from the official Visual Studio website.
You can find more information about CVE-2023-23618 on the Microsoft Security Response Center website.