CyberSecurity news
Pierluigi Paganini@securityaffairs.com
//
Multiple vulnerabilities have been discovered in Git and its related tools, posing a risk to user credentials. These flaws stem from the improper handling of message delimiters within the Git Credential Protocol, impacting tools such as GitHub Desktop, Git Credential Manager, Git LFS, GitHub CLI, and GitHub Codespaces. This improper handling allows malicious actors to craft URLs with injected carriage return or newline characters, leading to credential leaks. Specifically, vulnerabilities like CVE-2025-23040 in GitHub Desktop allowed for 'carriage return smuggling' through crafted submodule URLs.
These vulnerabilities arise from differences between Git's strict protocol handling and the implementation of related projects. Git Credential Manager is vulnerable due to the StreamReader class, misinterpreting line-endings, while Git LFS is vulnerable by not checking for embedded control characters, allowing for the injection of carriage return line feeds via crafted HTTP URLs. A new configuration setting, `credential.protectProtocol`, has been introduced to help mitigate these vulnerabilities by providing a defense-in-depth approach.
ImgSrc: securityaffairs
References :
- Cyber Security News: Critical GitHub Flaw Allows Credential Leaks Through Malicious Repos
- securityaffairs.com: Multiple Git flaws led to credentials compromise
- The Hacker News: GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs
- cyberpress.org: Critical GitHub Flaw Allows Credential Leaks Through Malicious Repos
- ciso2ciso.com: Multiple Git flaws led to credentials compromise – Source: securityaffairs.com
- ciso2ciso.com: Multiple security vulnerabilities have been disclosed in GitHub Desktop as well as other Git-related projects that, if successfully exploited, could permit an attacker to gain unauthorized access to a user’s Git credentials. “Git implements a protocol called Git Credential Protocol to retrieve credentials from the credential helper,� GMO Flatt Security […] La entrada se publicó primero en .
- ciso2ciso.com: GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs – Source:thehackernews.com
- discuss.privacyguides.net: GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs
- Pyrzout :vm:: Multiple Git flaws led to credentials compromise – Source: securityaffairs.com
- Dataconomy: Clone2Leak exposes credential risks in Git ecosystem
- BleepingComputer: A set of three distinct but related attacks, dubbed 'Clone2Leak,' can leak credentials by exploiting how Git and its credential helpers handle authentication requests.
- www.bleepingcomputer.com: News about Clone2Leak vulnerabilities in the Git ecosystem.
Classification:
- HashTags: #Git #CredentialLeak #Security
- Company: Git
- Target: Git Users
- Product: Git
- Feature: Credential Retrieval Protocol
- Type: Vulnerability
- Severity: High