You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Any user of Git CMD who starts the command in an untrusted directory is impacted: Maliciously-placed doskey.exe would be executed silently upon running Git CMD.
Patches
The problem has been patched in Git for Windows v2.40.1.
Workarounds
Avoid using Git CMD. If using Git CMD, avoid starting it in an untrusted directory.
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Learn more on MITRE.
Impact
Any user of Git CMD who starts the command in an untrusted directory is impacted: Maliciously-placed
doskey.exe
would be executed silently upon running Git CMD.Patches
The problem has been patched in Git for Windows v2.40.1.
Workarounds
Avoid using Git CMD. If using Git CMD, avoid starting it in an untrusted directory.
References
Similar vulnerabilities: