#VU27258 Insufficiently protected credentials in Git - CVE-2020-5260
Published: April 23, 2020 / Updated: June 3, 2020
Git
Git
Description
The vulnerability allows a remote attacker to gain access to sensitive information on the system.
The vulnerability exists due to the Git can be tricked into sending private credentials to a host controlled by an attacker. A remote attacker can send a specially crafted URL to "git clone" that will present stored credentials for any host to a host of their choosing.
Remediation
External links
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00027.html
- http://packetstormsecurity.com/files/157250/Git-Credential-Helper-Protocol-Newline-Injection.html
- http://www.openwall.com/lists/oss-security/2020/04/15/5
- http://www.openwall.com/lists/oss-security/2020/04/15/6
- http://www.openwall.com/lists/oss-security/2020/04/20/1
- https://github.com/git/git/commit/9a6bbee8006c24b46a85d29e7b38cfa79e9ab21b
- https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q
- https://lists.debian.org/debian-lts-announce/2020/04/msg00010.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPCEOIFLLEF24L6GLVJVFZX4CREDEHDF/
- https://lore.kernel.org/git/xmqqy2qy7xn8.fsf@gitster.c.googlers.com/
- https://support.apple.com/kb/HT211141
- https://www.debian.org/security/2020/dsa-4657