
Cloud Vulnerability DB
A community-led vulnerabilities database
gix-path, a crate of the gitoxide project dealing with git paths and their conversions, contains a vulnerability (CVE-2024-45305) where it incorrectly treats local repository configuration as system-wide when no higher scoped configuration is found. This vulnerability was disclosed on September 2, 2024, affecting versions prior to 0.10.10. The issue impacts the gix-path crate's functionality in handling git configuration files (GitHub Advisory).
The vulnerability exists in the gixpath::env implementation of the installationconfig and installationconfigprefix functions. These functions call 'git config -l --show-origin' and parse the first line of output to extract the path to the configuration file holding the configuration variable of highest scope. The issue occurs when configuration files associated with higher scopes are deliberately skipped or when system and global configurations are empty or unavailable. In such cases, the local repository's configuration is incorrectly treated as system-wide. The vulnerability has been assigned a CVSS v3.1 score of 2.5 (Low) with vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N (GitHub Advisory).
The vulnerability can lead to two main issues: 1) A less secure configuration may be set for a specific repository where it is deemed acceptable but undesirable for other repositories, and 2) Configuration that supplies secrets for one repository's remote can be leaked to another repository's remote. This could result in sending credentials to unintended repositories. The impact is particularly concerning when operating on one repository while located in another, such as during cloning operations (GitHub Advisory).
The issue has been addressed in release version 0.10.10, and all users are advised to upgrade. Additionally, users can implement more secure general practices such as using a credential manager or using http..extraHeader with specific configurations rather than general http.extraHeader. It's recommended to ensure each repository's configuration is as secure as possible for its intended use, and secrets are stored securely and separately (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."