CVE-2024-22190: Untrusted search path under some conditions on Windows allows arbitrary code execution
(updated )
This issue exists because of an incomplete fix for CVE-2023-40590. On Windows, GitPython uses an untrusted search path if it uses a shell to run git
, as well as when it runs bash.exe
to interpret hooks. If either of those features are used on Windows, a malicious git.exe
or bash.exe
may be run from an untrusted repository.
References
- github.com/advisories/GHSA-2mqj-m65w-jghx
- github.com/gitpython-developers/GitPython
- github.com/gitpython-developers/GitPython/commit/ef3192cc414f2fd9978908454f6fd95243784c7f
- github.com/gitpython-developers/GitPython/pull/1792
- github.com/gitpython-developers/GitPython/security/advisories/GHSA-2mqj-m65w-jghx
- github.com/pypa/advisory-database/tree/main/vulns/gitpython/PYSEC-2024-4.yaml
- nvd.nist.gov/vuln/detail/CVE-2024-22190
Detect and mitigate CVE-2024-22190 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →