Path traversal vulnerability in Git or Visual Studio - CVE-2023-23946ID: oval:org.secpod.oval:def:87778 | Date: (C)2023-02-28 (M)2024-06-13 |
Class: VULNERABILITY | Family: windows |
The host is installed with Visual Studio 2017 or 2019 or 2022 or Git before 2.30.8, 2.31.x before 2.31.7, 2.32.x before 2.32.6, 2.33.x before 2.33.7, 2.34.x before 2.34.7, 2.35.x before 2.35.7, 2.36.x before 2.36.5, 2.37.x before 2.37.6, 2.38.x before 2.38.4 or 2.39.x before 2.39.2 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to handle a specially crafted input to git apply. Successful exploitation allows attackers to overwrite a path outside the working tree as the user who is running git apply.
Platform: |
Microsoft Windows 11 |
Microsoft Windows Server 2022 |
Microsoft Windows 7 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows 8.1 |
Microsoft Windows 10 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2019 |
Microsoft Windows Server 2012 R2 |
Product: |
Git |
Microsoft Visual Studio 2017 |
Microsoft Visual Studio 2019 |
Microsoft Visual Studio 2022 |