CVE-2024-32002
Git
CVE-2024-32002 is a critical vulnerability in Git that allows for arbitrary code execution during cloning operations. This flaw impacts Git versions prior to 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, where maliciously crafted repositories with submodules can trick Git into writing files into the .git/
directory. This enables the injection and execution of malicious hooks while the clone is in progress, leaving users vulnerable to untrusted code execution. With an SVRS of 70, CVE-2024-32002 presents a serious risk, as active exploits are available. While disabling symbolic link support mitigates the vulnerability, updating to the patched versions of Git is strongly advised. Organizations using Git should prioritize updating to the patched version of git to prevent potential security breaches. The presence of "In The Wild" and "Exploit Available" tags further emphasizes the urgent need to apply these updates.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.