Cyber Posture

CVE-2024-52005

High

Published: 15 January 2025

Published
15 January 2025
Modified
18 December 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0038 59.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-52005 is a high-severity Improper Encoding or Escaping of Output (CWE-116) vulnerability in Git Git. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Masquerading (T1036); ranked in the top 40.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-15 (Information Output Filtering) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Masquerading (T1036) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely flaw remediation through patching Git to fix improper handling of ANSI escape sequences in sideband channel messages.

prevent

Mandates filtering of information output to the terminal to neutralize malicious control sequences embedded in remote Git messages.

prevent

Ensures secure error handling for informational and error messages received via Git's sideband channel without compromising terminal security.

MITRE ATT&CK Enterprise TechniquesAI

T1036 Masquerading Stealth
Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools.
T1204 User Execution Execution
An adversary may rely upon specific actions by a user in order to gain execution.
Why these techniques?

The vulnerability enables injection of ANSI escape sequences via Git sideband 'remote:' messages to the client terminal, allowing adversaries to masquerade legitimate output by hiding or misrepresenting information (T1036) and trick users into executing untrusted scripts (T1204).

NVD Description

Git is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called "sideband channel". These messages will be prefixed…

more

with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information, or to mislead the user into executing untrusted scripts. As requested on the git-security mailing list, the patches are under discussion on the public mailing list. Users are advised to update as soon as possible. Users unable to upgrade should avoid recursive clones unless they are from trusted sources.

Deeper analysisAI

CVE-2024-52005 is a vulnerability in Git, a widely used source code management tool, stemming from improper handling of informational and error messages transmitted via the sideband channel during operations like cloning, fetching, or pushing from a remote server. These messages, prefixed with "remote:", are printed directly to the client's standard error output, which is typically connected to a terminal supporting ANSI escape sequences. Git previously lacked protections against these sequences, allowing malicious control sequences to be embedded in the messages.

The vulnerability can be exploited by an attacker controlling a remote Git server or repository. A victim running Git commands against this malicious remote would receive crafted "remote:" messages on their terminal, enabling the attacker to hide or misrepresent information or trick the user into executing untrusted scripts. Exploitation requires user interaction (UI:R), occurs over the network with low complexity and no privileges (AV:N/AC:L/PR:N), and results in high confidentiality, integrity, and availability impacts (C:H/I:H/A:H), as scored at CVSS 3.1 8.8. It is associated with CWE-116 (Improper Encoding or Escaping of Output) and CWE-150 (Improper Neutralization of Escape, Meta, or Control Sequences).

The Git security advisory (GHSA-7jjc-gg6m-3329) and related public mailing list discussions note that patches are under review on the git-security mailing list as requested for transparency. Users should update Git as soon as patches are available. Those unable to upgrade are advised to avoid recursive clones unless from trusted sources.

Details

CWE(s)

Affected Products

git
git
≤ 2.40.4 · 2.41.0 — 2.41.3 · 2.42.0 — 2.42.4

CVEs Like This One

CVE-2024-52006Same product: Git Git
CVE-2026-31898Shared CWE-116
CVE-2026-34483Shared CWE-116
CVE-2025-55729Shared CWE-116
CVE-2025-15311Shared CWE-150
CVE-2025-55730Shared CWE-116
CVE-2024-10441Shared CWE-116
CVE-2026-26149Shared CWE-150
CVE-2026-25940Shared CWE-116
CVE-2026-33597Shared CWE-116

References