cve/2024/CVE-2024-32004.md
2024-06-07 04:52:01 +00:00

21 lines
1.0 KiB
Markdown

### [CVE-2024-32004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32004)
![](https://img.shields.io/static/v1?label=Product&message=git&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3D%202.45.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-114%3A%20Process%20Control&color=brighgreen)
### Description
Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, an attacker can prepare a local repository in such a way that, when cloned, will execute arbitrary code during the operation. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. As a workaround, avoid cloning repositories from untrusted sources.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/10cks/CVE-2024-32004-POC
- https://github.com/Wadewfsssss/CVE-2024-32004
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/testing-felickz/docker-scout-demo