CVE-2024-50338

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-50338
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50338.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50338
Aliases
Published
2025-01-14T19:15:31Z
Modified
2025-05-24T03:22:59.121295Z
Summary
[none]
Details

Git Credential Manager (GCM) is a secure Git credential helper built on .NET that runs on Windows, macOS, and Linux. The Git credential protocol is text-based over standard input/output, and consists of a series of lines of key-value pairs in the format key=value. Git's documentation restricts the use of the NUL (\0) character and newlines to form part of the keys or values. When Git reads from standard input, it considers both LF and CRLF as newline characters for the credential protocol by virtue of calling strbuf_getline that calls to strbuf_getdelim_strip_crlf. Git also validates that a newline is not present in the value by checking for the presence of the line-feed character (LF, \n), and errors if this is the case. This captures both LF and CRLF-type newlines. Git Credential Manager uses the .NET standard library StreamReader class to read the standard input stream line-by-line and parse the key=value credential protocol format. The implementation of the ReadLineAsync method considers LF, CRLF, and CR as valid line endings. This is means that .NET considers a single CR as a valid newline character, whereas Git does not. This mismatch of newline treatment between Git and GCM means that an attacker can craft a malicious remote URL. When a user clones or otherwise interacts with a malicious repository that requires authentication, the attacker can capture credentials for another Git remote. The attack is also heightened when cloning from repositories with submodules when using the --recursive clone option as the user is not able to inspect the submodule remote URLs beforehand. This issue has been patched in version 2.6.1 and all users are advised to upgrade. Users unable to upgrade should only interact with trusted remote repositories, and not clone with --recursive to allow inspection of any submodule URLs before cloning those submodules.

References

Affected packages

Git / github.com/git-ecosystem/git-credential-manager

Affected ranges

Type
GIT
Repo
https://github.com/git-ecosystem/git-credential-manager
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v2.*

v2.0.124-beta
v2.0.153-beta
v2.0.157-beta
v2.0.164-beta
v2.0.194-beta
v2.0.22-beta
v2.0.246-beta
v2.0.249-beta
v2.0.252-beta
v2.0.280-beta
v2.0.289-beta
v2.0.318-beta
v2.0.33-beta
v2.0.374-beta
v2.0.394-beta
v2.0.435-beta
v2.0.452
v2.0.472
v2.0.474
v2.0.475
v2.0.498
v2.0.5-beta
v2.0.567
v2.0.603
v2.0.605
v2.0.632
v2.0.692
v2.0.696
v2.0.779
v2.0.785
v2.0.79-beta
v2.0.866
v2.0.87-beta
v2.0.877
v2.0.886
v2.0.931
v2.0.935
v2.1.0
v2.1.1
v2.1.2
v2.2.0
v2.2.1
v2.2.2
v2.3.0
v2.3.1