8.8
CWE
178
Advisory Published
Updated

GHSA-3p86-9955-h393

First published: Mon Sep 18 2023(Updated: )

Arbitrary File Overwrite in Eclipse JGit <= 6.6.0 In Eclipse JGit, all versions <= 6.6.0.202305301015-r, a symbolic link present in a specially crafted git repository can be used to write a file to locations outside the working tree when this repository is cloned with JGit to a case-insensitive filesystem, or when a checkout from a clone of such a repository is performed on a case-insensitive filesystem. This can happen on checkout (DirCacheCheckout), merge (ResolveMerger via its WorkingTreeUpdater), pull (PullCommand using merge), and when applying a patch (PatchApplier). This can be exploited for remote code execution (RCE), for instance if the file written outside the working tree is a git filter that gets executed on a subsequent git command. The issue occurs only on case-insensitive filesystems, like the default filesystems on Windows and macOS. The user performing the clone or checkout must have the rights to create symbolic links for the problem to occur, and symbolic links must be enabled in the git configuration. Setting git configuration option core.symlinks = false before checking out avoids the problem. The issue was fixed in Eclipse JGit version 6.6.1.202309021850-r and 6.7.0.202309050840-r, available via Maven Central https://repo1.maven.org/maven2/org/eclipse/jgit/  and repo.eclipse.org https://repo.eclipse.org/content/repositories/jgit-releases/ . A backport is available in 5.13.3 starting from 5.13.3.202401111512-r. The JGit maintainers would like to thank RyotaK for finding and reporting this issue.

Affected SoftwareAffected VersionHow to fix
maven/org.eclipse.jgit:org.eclipse.jgit<5.13.3.202401111512-r
5.13.3.202401111512-r
maven/org.eclipse.jgit:org.eclipse.jgit>=6.0.0.202111291000-r<=6.6.0.202305301015-r
6.6.1.202309021850-r

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of GHSA-3p86-9955-h393?

    The severity of GHSA-3p86-9955-h393 is high with a severity value of 8.8.

  • How does the Arbitrary File Overwrite vulnerability in Eclipse JGit <= 6.6.0 work?

    In Eclipse JGit <= 6.6.0, a symbolic link present in a specially crafted git repository can be used to write a file to locations outside the working tree when this repository is cloned with JGit to a case-insensitive file system.

  • Which versions of Eclipse JGit are affected by the Arbitrary File Overwrite vulnerability?

    All versions of Eclipse JGit up to 6.6.0 are affected by the Arbitrary File Overwrite vulnerability.

  • How can I fix the Arbitrary File Overwrite vulnerability in Eclipse JGit?

    To fix the Arbitrary File Overwrite vulnerability in Eclipse JGit, update to version 6.6.1.202309021850-r or later.

  • Where can I find more information about the Arbitrary File Overwrite vulnerability in Eclipse JGit?

    You can find more information about the Arbitrary File Overwrite vulnerability in Eclipse JGit at the following references: [link1], [link2], [link3].

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203