CVE-2014-9390: JGit Improper Input Validation vulnerability
(updated )
Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine; libgit2; Egit; and JGit allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.
References
- github.com/advisories/GHSA-6vvc-c2m3-cjf3
- github.com/blog/1938-git-client-vulnerability-announced
- github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915
- github.com/pypa/advisory-database/tree/main/vulns/mercurial/PYSEC-2020-217.yaml
- libgit2.org/security
- news.ycombinator.com/item?id=8769667
- nvd.nist.gov/vuln/detail/CVE-2014-9390
- projects.eclipse.org/projects/technology.jgit/releases/3.5.3
- web.archive.org/web/20211204220400/https://securitytracker.com/id?1031404
Detect and mitigate CVE-2014-9390 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →