Cyber Posture

CVE-2024-52005

High

Published: 15 January 2025

Published
15 January 2025
Modified
18 December 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0038 59.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may rely upon specific actions by a user in order to gain execution.

Security Summary

CVE-2024-52005 is a vulnerability in Git, a widely used source code management tool, stemming from improper handling of informational and error messages transmitted via the sideband channel during operations like cloning, fetching, or pushing from a remote server. These messages, prefixed with "remote:", are printed directly to the client's standard error output, which is typically connected to a terminal supporting ANSI escape sequences. Git previously lacked protections against these sequences, allowing malicious control sequences to be embedded in the messages.

The vulnerability can be exploited by an attacker controlling a remote Git server or repository. A victim running Git commands against this malicious remote would receive crafted "remote:" messages on their terminal, enabling the attacker to hide or misrepresent information or trick the user into executing untrusted scripts. Exploitation requires user interaction (UI:R), occurs over the network with low complexity and no privileges (AV:N/AC:L/PR:N), and results in high confidentiality, integrity, and availability impacts (C:H/I:H/A:H), as scored at CVSS 3.1 8.8. It is associated with CWE-116 (Improper Encoding or Escaping of Output) and CWE-150 (Improper Neutralization of Escape, Meta, or Control Sequences).

The Git security advisory (GHSA-7jjc-gg6m-3329) and related public mailing list discussions note that patches are under review on the git-security mailing list as requested for transparency. Users should update Git as soon as patches are available. Those unable to upgrade are advised to avoid recursive clones unless from trusted sources.

Details

CWE(s)
CWE-116CWE-150

Affected Products

git
git
≤ 2.40.4 · 2.41.0 — 2.41.3 · 2.42.0 — 2.42.4

MITRE ATT&CK Enterprise Techniques

T1036 Masquerading Stealth
Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools.
T1204 User Execution Execution
An adversary may rely upon specific actions by a user in order to gain execution.
Why these techniques?

The vulnerability enables injection of ANSI escape sequences via Git sideband 'remote:' messages to the client terminal, allowing adversaries to masquerade legitimate output by hiding or misrepresenting information (T1036) and trick users into executing untrusted scripts (T1204).

References