Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/git-lfs/git-lfs
  4. ›
  5. CVE-2024-53263

CVE-2024-53263: Git LFS permits exfiltration of credentials via crafted HTTP URLs

January 14, 2025 (updated January 23, 2025)

When Git LFS requests credentials from Git for a remote host, it passes portions of the host’s URL to the git-credential(1) command without checking for embedded line-ending control characters, and then sends any credentials it receives back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user’s Git credentials.

References

  • github.com/advisories/GHSA-q6r2-x2cc-vrp7
  • github.com/git-lfs/git-lfs
  • github.com/git-lfs/git-lfs/commit/0345b6f816e611d050c0df67b61f0022916a1c90
  • github.com/git-lfs/git-lfs/releases/tag/v3.6.1
  • github.com/git-lfs/git-lfs/security/advisories/GHSA-q6r2-x2cc-vrp7
  • lists.debian.org/debian-lts-announce/2025/01/msg00022.html
  • nvd.nist.gov/vuln/detail/CVE-2024-53263
  • pkg.go.dev/vuln/GO-2025-3390

Code Behaviors & Features

Detect and mitigate CVE-2024-53263 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.1.0 up to 3.0.0

Solution

Unfortunately, there is no solution available yet.

Weakness

  • CWE-436: Interpretation Conflict
  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Source file

go/github.com/git-lfs/git-lfs/CVE-2024-53263.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:40 +0000.