Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS12MjZyLTRjOWMtaDNqNs4AA_QH
gix-path uses local config across repos when it is the highest scope
Summary
gix-path
executes git
to find the path of a configuration file that belongs to the git
installation itself, but mistakenly treats the local repository's configuration as system-wide if no higher scoped configuration is found. In rare cases, this causes a less trusted repository to be treated as more trusted, or leaks sensitive information from one repository to another, such as sending credentials to another repository's remote.
Details
In gix_path::env
, the underlying implementation of the installation_config
and installation_config_prefix
functions calls git config -l --show-origin
and parses the first line of the output to extract the path to the configuration file holding the configuration variable of highest scope:
While the configuration variable of highest scope is not usually in the local scope, there are practical situations where this occurs:
- A configuration file truly associated with the installation is not present on all systems and can occasionally be empty. Likewise, there may be no variables in the global scope.
- Configuration files associated with those higher scopes may be deliberately skipped by setting the
GIT_CONFIG_SYSTEM
andGIT_CONFIG_GLOBAL
environment variables to/dev/null
(or toNUL
on Windows). This preventsgix-path
from finding the path of configuration files for those scopes, while not preventing downstream components such as the function ingix-config
from reporting a local path as being associated with the installation. - The
GIT_CONFIG_NOSYSTEM
environment variable can be used to disable configuration associated with the installation. (GIT_CONFIG_NOSYSTEM=1
is more powerful thanGIT_CONFIG_SYSTEM=/dev/null
on systems where an additional "unknown" scope is associated with the installation, as occurs on macOS with Apple Git.) This will cause the local scope to be the highest nonempty scope under even more situations, though in practice it is less dangerous because most, though possibly not all, downstream components would disregard the value.
A user may use either or both of the latter two techniques to turn off an undesired configuration or to create a more replicable environment. Such a user would expect that this results in a more controlled configuration.
Often, when located inside one repository, a user performs operations on that repository or that are not specific to any repository. In such use, local configuration is typically desired or at least acceptable, and mistaking it as coming from another scope is not typically harmful.
However, sometimes a user is in one repository and operates on another repository. A major case where this occurs is cloning one repository while located in another. This can be done in an ad-hoc fashion, including when cloning the repository outside of the one we are inside. It may also potentially be automated by an application for purposes such as submodule handling. Two kinds of problems are anticipated:
- A less secure configuration may be set for a specific repository where it is judged acceptable, even though it would not be wanted for other repositories, such as to enable a protocol or set up debugging.
- More likely, a configuration that supplies secrets for use in one repository's remote can be used to send those secrets to another repository's remote.
PoC
In this example, we send mock Authorization: Basic ...
credentials meant for one repository's remote to another remote, by running gix
while inside the first repository to clone the second repository.
These instructions are written for a Unix shell, but they will work in other shells, including in PowerShell on Windows if the method of setting environment variables is adapted and /dev/null
is replaced with NUL
. This procedure is likely to demonstrate the problem on all systems except macOS. This is due to the high-scoped "unknown" configuration that usually accompanies Apple Git, and reflects that gix-path is in practice much less vulnerable on macOS (though still potentially vulnerable).
-
Install
dummyhttp
to serve as a local HTTP server for the demonstration. -
Obtain a build of
gitoxide
with themax
feature set enabled. While this vulnerability affects other builds, this example requiresmax
forhttp.extraHeader
support.Running
cargo install gitoxide
will install such a build though it may build against a patched version ofgix-path
. Cloning the repository (12251eb052df30105538fa831e641eea557f13d8 and earlier are affected) and building withcargo build
orcargo install --path .
are also sufficient. In contrast, installing from published binaries withbinstall
orquickinstall
does not provide themax
feature, as of this writing. -
Run:
dummyhttp -i 127.0.0.1 -c 403 -v
-
In a separate terminal, create a new local repository and set up a mock remote and
http.extraHeader
configuration:git init myrepo cd myrepo git remote add origin http://127.0.0.1:8080/mygit.git git config --local http.extraHeader 'Authorization: Basic abcde'
-
Make sure the testing setup is working by running
gix fetch
in the repository and checking that it fails in the expected way. In the terminal where that is run, a message should be shown indicating an HTTP 403 error. The more interesting output is in the terminal wheredummyhttp
is running, which should look like this:2024-30-30 03:30:16 127.0.0.1:55689 GET /myrepo.git/info/refs?service=git-upload-pack HTTP/1.1 ┌─Incoming request │ GET /myrepo.git/info/refs?service=git-upload-pack HTTP/1.1 │ Accept: */* │ Authorization: Basic abcde │ Git-Protocol: version=2 │ Host: 127.0.0.1:8080 │ User-Agent: git/oxide-0.42.2 ┌─Outgoing response │ HTTP/1.1 403 Forbidden │ Content-Length: 9 │ Content-Type: text/plain; charset=utf-8 │ Date: Fri, 30 Aug 2024 03:30:16 -0400
Some details may differ, especially dates and times. But
Authorization: Basic abcde
should be shown. -
Now, in the terminal where you ran
gix fetch
, try cloning a separate repository:gix clone http://127.0.0.1:8080/other.git
Check the output appended in the terminal where
dummyhttp
is running. This is to observe thatAuthorization: Basic abcde
was rightly not sent.Alternatively, if it does appear, then your system may be in one of the uncommon configurations that is vulnerable without further action.
-
Now rerun that command, but with a modified environment, to cause
gix-path
to wrongly treat configuration from the local scope as being associated with thegit
installation:env GIT_CONFIG_SYSTEM=/dev/null GIT_CONFIG_GLOBAL=/dev/null gix clone http://127.0.0.1:8080/other.git
Check the output appended in the terminal where
dummyhttp
is running. Observe thatAuthorization: Basic abcde
was wrongly sent.
While this procedure uses the same remote host for both repositories, this is not a required element. If the second repository had a different, untrusted host, the extra header would still be sent.
Impact
It is believed to be very difficult to exploit this vulnerability deliberately, due to the need either to anticipate a situation in which higher-scoped configuration variables would be absent, or to arrange for this to happen. Although any operating system may be affected, users running Apple Git on macOS are much less likely to be affected.
In the example shown above, more secure general practices would avoid it: using a credential manager, or even using http.<url>.extraHeader
with as specific a <url>
as possible, rather than the more general http.extraHeader
. Many scenarios are analogous: if each repository's configuration is as secure as possible for how the repository is used, and secrets are stored securely and separately, then the circumstances under which an unacceptably unsecure configuration is used, or under which a leak of credentials would occur, become unlikely.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12MjZyLTRjOWMtaDNqNs4AA_QH
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: 4 months ago
Updated: 4 months ago
CVSS Score: 2.5
CVSS vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
EPSS Percentage: 0.00045
EPSS Percentile: 0.17541
Identifiers: GHSA-v26r-4c9c-h3j6, CVE-2024-45305
References:
- https://github.com/Byron/gitoxide/security/advisories/GHSA-v26r-4c9c-h3j6
- https://nvd.nist.gov/vuln/detail/CVE-2024-45305
- https://git-scm.com/docs/git-config#SCOPES
- https://github.com/Byron/gitoxide/blob/12251eb052df30105538fa831e641eea557f13d8/gix-path/src/env/git/mod.rs#L112
- https://github.com/Byron/gitoxide/blob/12251eb052df30105538fa831e641eea557f13d8/gix-path/src/env/git/mod.rs#L91
- https://rustsec.org/advisories/RUSTSEC-2024-0367.html
- https://github.com/advisories/GHSA-v26r-4c9c-h3j6
Blast Radius: 7.3
Affected Packages
cargo:gix-path
Dependent packages: 26Dependent repositories: 801
Downloads: 10,071,400 total
Affected Version Ranges: < 0.10.10
Fixed in: 0.10.10
All affected versions: 0.7.1, 0.7.2, 0.7.3, 0.7.4, 0.8.0, 0.8.1, 0.8.2, 0.8.3, 0.8.4, 0.9.0, 0.10.0, 0.10.1, 0.10.2, 0.10.3, 0.10.4, 0.10.5, 0.10.6, 0.10.7, 0.10.8, 0.10.9
All unaffected versions: 0.10.10, 0.10.11, 0.10.12, 0.10.13