CVE-2022-24767

GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:git_for_windows_project:git_for_windows:*:*:*:*:*:*:*:*

History

02 Aug 2023, 19:28

Type Values Removed Values Added
First Time Git For Windows Project git For Windows
Git For Windows Project
CPE cpe:2.3:a:git_for_windows_project:git_for_windows:*:*:*:*:*:*:*:*

21 Apr 2022, 14:05

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 6.9
v3 : 7.8
CWE CWE-427
First Time Microsoft
Microsoft visual Studio 2022
Microsoft visual Studio 2017
Microsoft visual Studio 2019
References (N/A) https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24767 - (N/A) https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24767 - Patch, Vendor Advisory
CPE cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*

15 Apr 2022, 19:15

Type Values Removed Values Added
CWE CWE-427
References
  • {'url': 'https://github.com/git-for-windows/git/security/advisories/GHSA-gf48-x3vr-j5c3', 'name': 'https://github.com/git-for-windows/git/security/advisories/GHSA-gf48-x3vr-j5c3', 'tags': [], 'refsource': 'CONFIRM'}
  • (N/A) https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24767 -
Summary Git for Windows is a fork of Git containing Windows-specific patches. Since part of Git for Windows' uninstaller is copied into the current user's temporary directory and run in that place, it is important to ensure that there are no malicious `.dll` file in that directory that might be loaded as part of loading the executable. However, the default system settings for `TMP` and `TEMP` are to point to `C:\Windows\Temp`, a folder that is world-writable (for historical reasons), and the SYSTEM user account inherits those settings. This means that any authenticated user can place malicious `.dll` files that are loaded when Git for Windows' uninstaller is run via the SYSTEM account. Fixes are available in Git for Windows v2.35.2 or newer. Users unable to upgrade may override SYSTEM's `TMP` environment variable to point to a directory exclusively under SYSTEM's control before running the uninstaller, clear `C:\Windows\Temp` of all `.dll` files before running the uninstaller, or run the uninstaller under an admin account rather than SYSTEM as a workaround. GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account.

12 Apr 2022, 18:52

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-12 18:15

Updated : 2023-12-13 16:15


NVD link : CVE-2022-24767

Mitre link : CVE-2022-24767

CVE.ORG link : CVE-2022-24767


JSON object : View

Products Affected

git_for_windows_project

  • git_for_windows

microsoft

  • visual_studio_2017
  • visual_studio_2022
  • visual_studio_2019
CWE
CWE-427

Uncontrolled Search Path Element