CVE-2014-9390
Java vulnerability analysis and mitigation

Overview

CVE-2014-9390 affects multiple Git client versions (before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1) on Windows and OS X operating systems. The vulnerability was discovered by Matt Mackall and Augie Fackler of the Mercurial project and disclosed in December 2014. The issue affects Git clients, Mercurial before 3.2.3, Apple Xcode before 6.2 beta 3, libgit2 before 0.21.2, Egit, and JGit running on case-insensitive or case-normalizing filesystems (Git Blame Blog, GitHub Blog).

Technical details

The vulnerability exists due to insufficient validation of repository paths on case-insensitive filesystems. An attacker can craft a malicious Git tree containing a .git/config file with different case variations (e.g., .Git/config or .gIt/config) or using ignorable Unicode codepoints. On case-insensitive filesystems like Windows NTFS and Mac OS X HFS+, these crafted paths can overwrite the legitimate .git/config file. The vulnerability received a CVSS v3.1 Base Score of 9.8 (CRITICAL) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

When exploited, this vulnerability allows remote Git servers to execute arbitrary commands on client machines through malicious repository trees. The impact is particularly severe as it can lead to complete system compromise when users clone, pull, or check out from a malicious repository (GitHub Blog, Rapid7).

Mitigation and workarounds

Users should immediately update their Git clients to the patched versions: v1.8.5.6, v1.9.5, v2.0.5, v2.1.4, or v2.2.1. Major Git libraries including libgit2 and JGit have released maintenance versions with fixes. GitHub for Windows and GitHub for Mac have also been updated to include the security fix. Additionally, GitHub has implemented server-side protection to block malicious trees (GitHub Blog, LibGit2).

Community reactions

The security community coordinated a simultaneous release of patches across multiple affected platforms and implementations. The vulnerability discovery highlighted the importance of case-sensitivity in filesystem security, leading to broader discussions about filesystem design and security implications (Git Blame Blog).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68931HIGH8.7
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026
CVE-2025-68703HIGH8.7
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026
CVE-2025-68704HIGH8.2
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026
CVE-2025-66169MEDIUM6.9
  • JavaJava
  • org.apache.camel:camel-neo4j
NoYesJan 14, 2026
CVE-2025-68925MEDIUM6.9
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management