CVE-2024-52005
Published: 15 January 2025
Summary
CVE-2024-52005 is a high-severity Improper Encoding or Escaping of Output (CWE-116) vulnerability in Git Git. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Masquerading (T1036); ranked in the top 40.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-15 (Information Output Filtering) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely flaw remediation through patching Git to fix improper handling of ANSI escape sequences in sideband channel messages.
Mandates filtering of information output to the terminal to neutralize malicious control sequences embedded in remote Git messages.
Ensures secure error handling for informational and error messages received via Git's sideband channel without compromising terminal security.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability enables injection of ANSI escape sequences via Git sideband 'remote:' messages to the client terminal, allowing adversaries to masquerade legitimate output by hiding or misrepresenting information (T1036) and trick users into executing untrusted scripts (T1204).
NVD Description
Git is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called "sideband channel". These messages will be prefixed…
more
with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information, or to mislead the user into executing untrusted scripts. As requested on the git-security mailing list, the patches are under discussion on the public mailing list. Users are advised to update as soon as possible. Users unable to upgrade should avoid recursive clones unless they are from trusted sources.
Deeper analysisAI
CVE-2024-52005 is a vulnerability in Git, a widely used source code management tool, stemming from improper handling of informational and error messages transmitted via the sideband channel during operations like cloning, fetching, or pushing from a remote server. These messages, prefixed with "remote:", are printed directly to the client's standard error output, which is typically connected to a terminal supporting ANSI escape sequences. Git previously lacked protections against these sequences, allowing malicious control sequences to be embedded in the messages.
The vulnerability can be exploited by an attacker controlling a remote Git server or repository. A victim running Git commands against this malicious remote would receive crafted "remote:" messages on their terminal, enabling the attacker to hide or misrepresent information or trick the user into executing untrusted scripts. Exploitation requires user interaction (UI:R), occurs over the network with low complexity and no privileges (AV:N/AC:L/PR:N), and results in high confidentiality, integrity, and availability impacts (C:H/I:H/A:H), as scored at CVSS 3.1 8.8. It is associated with CWE-116 (Improper Encoding or Escaping of Output) and CWE-150 (Improper Neutralization of Escape, Meta, or Control Sequences).
The Git security advisory (GHSA-7jjc-gg6m-3329) and related public mailing list discussions note that patches are under review on the git-security mailing list as requested for transparency. Users should update Git as soon as patches are available. Those unable to upgrade are advised to avoid recursive clones unless from trusted sources.
Details
- CWE(s)