### [CVE-2024-53263](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53263) ![](https://img.shields.io/static/v1?label=Product&message=git-lfs&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%200.1.0%2C%20%3C%203.6.1%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20('Injection')&color=brighgreen) ### Description Git LFS is a Git extension for versioning large files. When Git LFS requests credentials from Git for a remote host, it passes portions of the host's URL to the `git-credential(1)` command without checking for embedded line-ending control characters, and then sends any credentials it receives back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user's Git credentials. This problem exists in all previous versions and is patched in v3.6.1. All users should upgrade to v3.6.1. There are no workarounds known at this time. ### POC #### Reference No PoCs from references. #### Github - https://github.com/BahrainMobilityInternational/BMI-02 - https://github.com/Gandhiprakash07/Trail01 - https://github.com/JorJorBlinks/usek - https://github.com/Reh46/WEB1 - https://github.com/abdulrahmanasdfghj/brubru - https://github.com/botaktrade/ExnessID.com