CVE-2024-53263: Git LFS permits exfiltration of credentials via crafted HTTP URLs
(updated )
When Git LFS requests credentials from Git for a remote host, it passes portions of the host’s URL to the git-credential(1)
command without checking for embedded line-ending control characters, and then sends any credentials it receives back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user’s Git credentials.
References
- github.com/advisories/GHSA-q6r2-x2cc-vrp7
- github.com/git-lfs/git-lfs
- github.com/git-lfs/git-lfs/commit/0345b6f816e611d050c0df67b61f0022916a1c90
- github.com/git-lfs/git-lfs/releases/tag/v3.6.1
- github.com/git-lfs/git-lfs/security/advisories/GHSA-q6r2-x2cc-vrp7
- nvd.nist.gov/vuln/detail/CVE-2024-53263
- pkg.go.dev/vuln/GO-2025-3390
Detect and mitigate CVE-2024-53263 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →