cve/2024/CVE-2024-53263.md

23 lines
1.5 KiB
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-53263](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53263)
![](https://img.shields.io/static/v1?label=Product&message=git-lfs&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%200.1.0%2C%20%3C%203.6.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20('Injection')&color=brighgreen)
### Description
Git LFS is a Git extension for versioning large files. When Git LFS requests credentials from Git for a remote host, it passes portions of the host's URL to the `git-credential(1)` command without checking for embedded line-ending control characters, and then sends any credentials it receives back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user's Git credentials. This problem exists in all previous versions and is patched in v3.6.1. All users should upgrade to v3.6.1. There are no workarounds known at this time.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/BahrainMobilityInternational/BMI-02
- https://github.com/Gandhiprakash07/Trail01
- https://github.com/JorJorBlinks/usek
- https://github.com/Reh46/WEB1
- https://github.com/abdulrahmanasdfghj/brubru
- https://github.com/botaktrade/ExnessID.com