### [CVE-2024-32004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32004) ![](https://img.shields.io/static/v1?label=Product&message=git&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3D%202.45.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-114%3A%20Process%20Control&color=brighgreen) ### Description Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, an attacker can prepare a local repository in such a way that, when cloned, will execute arbitrary code during the operation. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. As a workaround, avoid cloning repositories from untrusted sources. ### POC #### Reference No PoCs from references. #### Github - https://github.com/10cks/CVE-2024-32004-POC - https://github.com/Wadewfsssss/CVE-2024-32004 - https://github.com/nomi-sec/PoC-in-GitHub