PoC Exploit Released for Critical Git RCE Vulnerability


Recently, a critical vulnerability in Git, known as CVE-2024-32002, has emerged, posing substantial threats to users of this widely utilized version control system.

The vulnerability permits remote code execution (RCE) while cloning repositories with submodules, and the release of proof-of-concept (PoC) exploits has sparked apprehension within the cybersecurity community, as highlighted by a tweet from ThreatMon.

CVE-2024-32002 – Understanding the Vulnerability

This vulnerability, CVE-2024-32002, exploits a nuanced interaction between case-insensitive filesystems and symbolic links.

Crafting a repository with a specially designed submodule and symbolic link enables attackers to manipulate Git into executing a malicious hook script during the cloning process.

Mitigation Strategies for CVE-2024-32002

To address the risks associated with CVE-2024-32002, users are strongly advised to disable symbolic link support in Git using the command git config –global core.symlinks false. Additionally, exercising caution when cloning repositories from untrusted sources is imperative.

Git has promptly issued patches across various versions (v2.45.1, v2.44.1, v2.43.4, v2.42.2, v2.41.1, v2.40.2, and v2.39.4) to rectify this vulnerability, alongside others like CVE-2024-32004, which also facilitates RCE under distinct circumstances.

The widespread adoption of Git in software development, including on platforms such as GitHub and GitLab, heightens the potential impact of this vulnerability.

For individuals unable to immediately apply updates, exercising caution when cloning repositories from unverified sources is crucial.

Ongoing Vigilance and Action

The cybersecurity community remains vigilant, actively working to fortify the security of Git and associated tools.

For comprehensive details and real-time updates, visit the Git Security page on GitHub to stay informed about the latest advisories and security developments pertinent to Git.

Source: cybersecuritynews.com