// For flags

CVE-2022-31012

Git for Windows' installer can be tricked into executing an untrusted binary

Severity Score

7.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Git for Windows is a fork of Git that contains Windows-specific patches. This vulnerability in versions prior to 2.37.1 lets Git for Windows' installer execute a binary into `C:\mingw64\bin\git.exe` by mistake. This only happens upon a fresh install, not when upgrading Git for Windows. A patch is included in version 2.37.1. Two workarounds are available. Create the `C:\mingw64` folder and remove read/write access from this folder, or disallow arbitrary authenticated users to create folders in `C:\`.

Git para Windows es un fork de Git que contiene parches específicos para Windows. Esta vulnerabilidad en versiones anteriores a 2.37.1 permite al instalador de Git para Windows ejecutar un binario en "C:\mingw64\bin\git.exe" por error. Esto sólo ocurre en una instalación nueva, no cuando se actualiza Git para Windows. Es incluido un parche en versión 2.37.1. Se presentan dos mitigaciones disponibles. Cree la carpeta "C:\mingw64" y elimine el acceso de lectura/escritura de esta carpeta, o no permita a usuarios autenticados arbitrariamente crear carpetas en "C:\"

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-05-18 CVE Reserved
  • 2022-07-12 CVE Published
  • 2024-02-02 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-426: Untrusted Search Path
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Gitforwindows
Search vendor "Gitforwindows"
Git
Search vendor "Gitforwindows" for product "Git"
< 2.37.1
Search vendor "Gitforwindows" for product "Git" and version " < 2.37.1"
windows
Affected