Executive Summary
| Informations | |||
|---|---|---|---|
| Name | CVE-2022-39253 | First vendor Publication | 2022-10-19 |
| Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
| Cvss vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N | |||
|---|---|---|---|
| Overall CVSS Score | 5.5 | ||
| Base Score | 5.5 | Environmental Score | 5.5 |
| impact SubScore | 3.6 | Temporal Score | 5.5 |
| Exploitabality Sub Score | 1.8 | ||
| Attack Vector | Local | Attack Complexity | Low |
| Privileges Required | None | User Interaction | Required |
| Scope | Unchanged | Confidentiality Impact | High |
| Integrity Impact | None | Availability Impact | None |
| Calculate full CVSS 3.0 Vectors scores | |||
Security-Database Scoring CVSS v2
| Cvss vector : | |||
|---|---|---|---|
| Cvss Base Score | N/A | Attack Range | N/A |
| Cvss Impact Score | N/A | Attack Complexity | N/A |
| Cvss Expoit Score | N/A | Authentication | N/A |
| Calculate full CVSS 2.0 Vectors scores | |||
Detail
| Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` directory. The problem has been patched in the versions published on 2022-10-18, and backported to v2.30.x. Potential workarounds: Avoid cloning untrusted repositories using the `--local` optimization when on a shared machine, either by passing the `--no-local` option to `git clone` or cloning from a URL that uses the `file://` scheme. Alternatively, avoid cloning repositories from untrusted sources with `--recurse-submodules` or run `git config --global protocol.file.allow user`. |
Original Source
| Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253 |
CWE : Common Weakness Enumeration
| % | Id | Name |
|---|---|---|
| 100 % | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
CPE : Common Platform Enumeration
Sources (Detail)
Alert History
| Date | Informations |
|---|---|
| 2025-07-15 02:06:49 |
|
| 2025-07-14 12:21:06 |
|
| 2025-06-26 02:05:15 |
|
| 2025-06-25 12:20:19 |
|
| 2024-11-28 14:15:04 |
|
| 2024-08-02 13:40:51 |
|
| 2024-08-02 01:30:32 |
|
| 2024-06-11 00:28:19 |
|
| 2024-02-02 02:38:37 |
|
| 2024-02-01 12:27:54 |
|
| 2023-12-27 13:27:46 |
|
| 2023-11-07 21:31:24 |
|
| 2023-09-05 13:33:20 |
|
| 2023-09-05 01:27:19 |
|
| 2023-09-02 13:31:32 |
|
| 2023-09-02 01:27:43 |
|
| 2023-08-12 13:38:34 |
|
| 2023-08-12 01:27:01 |
|
| 2023-08-11 13:29:15 |
|
| 2023-08-11 01:27:51 |
|
| 2023-08-06 13:26:54 |
|
| 2023-08-06 01:26:43 |
|
| 2023-08-04 13:27:18 |
|
| 2023-08-04 01:27:04 |
|
| 2023-07-14 13:27:17 |
|
| 2023-07-14 01:26:48 |
|
| 2023-03-29 02:27:50 |
|
| 2023-03-28 12:26:50 |
|
| 2023-02-16 09:27:32 |
|
| 2023-02-15 05:27:38 |
|
| 2022-12-14 09:27:31 |
|
| 2022-12-07 00:27:30 |
|
| 2022-11-14 21:27:21 |
|
| 2022-11-08 09:27:24 |
|
| 2022-11-02 21:28:16 |
|
| 2022-11-02 00:27:21 |
|
| 2022-10-28 17:27:20 |
|
| 2022-10-24 21:27:21 |
|
| 2022-10-21 21:27:17 |
|
| 2022-10-19 17:27:27 |
|






