CVE-2024-53263
Git LFS permits exfiltration of credentials via crafted HTTP URLs
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Git LFS is a Git extension for versioning large files. When Git LFS requests credentials from Git for a remote host, it passes portions of the host's URL to the `git-credential(1)` command without checking for embedded line-ending control characters, and then sends any credentials it receives back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user's Git credentials. This problem exists in all previous versions and is patched in v3.6.1. All users should upgrade to v3.6.1. There are no workarounds known at this time.
A flaw was found in the Git LFS git extension. When Git LFS requests credentials from Git for a remote host, it passes portions of the host's URL to the `git-credential(1)` command without checking for embedded line-ending control characters and then sends any credentials it receives back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user's Git credentials.
An update that fixes one vulnerability is now available. This update for git-lfs fixes the following issues. This release introduces a security fix for all platforms, which has been assigned CVE-2024-53263. When requesting credentials from Git for a remote host, prior versions of Git LFS passed portions of the host's URL to the git-credential command without checking for embedded line-ending control characters, and then sent any credentials received back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed or carriage return characters into the URL, an attacker might have been able to retrieve a user's Git credentials. Git LFS now prevents bare line feed characters from being included in the values sent to the git-credential command, and also prevents bare carriage return characters from being included unless the credential.protectProtocol configuration option is set to a value equivalent to false.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-11-19 CVE Reserved
- 2025-01-14 CVE Published
- 2025-01-28 CVE Updated
- 2025-05-16 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://github.com/git-lfs/git-lfs/commit/0345b6f816e611d050c0df67b61f0022916a1c90 | X_refsource_misc | |
https://github.com/git-lfs/git-lfs/releases/tag/v3.6.1 | X_refsource_misc | |
https://github.com/git-lfs/git-lfs/security/advisories/GHSA-q6r2-x2cc-vrp7 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2024-53263 | 2025-01-30 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2338002 | 2025-01-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Git-lfs Search vendor "Git-lfs" | Git-lfs Search vendor "Git-lfs" for product "Git-lfs" | >= 0.1.0 < 3.6.1 Search vendor "Git-lfs" for product "Git-lfs" and version " >= 0.1.0 < 3.6.1" | en |
Affected
|