Impact
This vulnerability lets Git for Windows' installer execute a binary placed into C:\mingw64\bin\git.exe
by mistake (or intent); This only happens upon a fresh install, not when upgrading Git for Windows.
Patches
Included in v2.37.1
Workarounds
Create the C:\mingw64
folder and remove read/write access from this folder:
mkdir C:\mingw64
icacls C:\mingw64 /inheritance:r
Alternatively, disallow arbitrary authenticated users to create folders in C:\
(open the Properties of C:\
, go to the Security
tab and then click Advanced
, then remove the Special Permission to create folders for authenticated users).
Credits
Many thanks to 俞晨东 and the Lockheed Martin Red Team for (independently) finding and reporting the vulnerability!
For more information
If you have any questions or comments about this advisory:
Impact
This vulnerability lets Git for Windows' installer execute a binary placed into
C:\mingw64\bin\git.exe
by mistake (or intent); This only happens upon a fresh install, not when upgrading Git for Windows.Patches
Included in v2.37.1
Workarounds
Create the
C:\mingw64
folder and remove read/write access from this folder:Alternatively, disallow arbitrary authenticated users to create folders in
C:\
(open the Properties ofC:\
, go to theSecurity
tab and then clickAdvanced
, then remove the Special Permission to create folders for authenticated users).Credits
Many thanks to 俞晨东 and the Lockheed Martin Red Team for (independently) finding and reporting the vulnerability!
For more information
If you have any questions or comments about this advisory: