Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » GitHub Desktop vulnerability risk leakage through malicious removed URL
Global Security

GitHub Desktop vulnerability risk leakage through malicious removed URL

AdminBy AdminJanuary 27, 2025No Comments3 Mins Read
GitHub Desktop Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 27, 2025Red LakshmananVulnerability / safety software

Desktop GitHub vulnerability

Multiple safety vulnerabilities have been disclosed on the GitHub desktop, as well as in other GIT -related projects that, if successfully used, may allow an attacker to gain unauthorized access to the user’s credentials.

‘Git implements a protocol called the Git Account Protocol for receipt of credentials from Fuel Assistant“GMO Flatt Ry0tak security researcher, which discovered the shortcomings, – Note in an analysis published on Sunday. “Many projects were vulnerable to the accounting of the account in different ways.”

Cybersecurity

The list of identified vulnerabilities is as follows –

  • Cve-2025-23040 (CVSS Assessment: 6.6) – Arranged Remote URLs can lead to leaks in GitHub desktops
  • Cve-2024-50338 (CVSS assessment: 7.4) – The nature of the return of the transport in the remote URL allows the malicious repository
  • Cve-2024-53263 (CVSS Assessment: 8.5) – Git LFS Allow Powers Through Created URL HTTP
  • Cve-2024-53858 (CVSS assessment: 6.5) -Recurious cloning storage in GitHub CLI can be traced by authentication to no -hit

At the time new line Control character (“\ n”), study showed that the desktop github is sensitive to the return case of transportation (“\ r”) smuggling, causing the introduction of a character into the created URL can be traced attackers.

“Using an angrily designed URL, you can lead to improper interpretation of the credentials coming from Git in Advisory.

Similar weakness was also found in the Nuget Manager Git package, which allows the powers to be exposed to the unrelated host. The Git LFS has been found also not checking the presence of built -in control characters, which led to the line feeding line (CRLF) using the developed HTTP URL.

On the other hand, a vulnerability affecting GitHub CLI uses the fact that the access marker is set up to send hosts other than GitHub (.) COM and GHE (.) As long as the gitBub_enterprise_TOKEN, GH_DERPRISE_TOKEN, and GITHUB_TOKEN Codespaces are installed in the “true” in case of the latter.

“While both variables associated with the enterprise are not common, the Codespaces variable environment is always established in the truth when working on GitHub Codespaces,” Ry0tak said. “Thus, cloning malicious repository on GitHub Codespaces using GitHub CLI will always trace the accessories to the attacker.”

Successful operation of the above deficiencies can lead to malicious third party using authentication tokens to access privileged resources.

Cybersecurity

In response to the disclosure of the information, an account leak that follows from the smuggling with the return of transportation was considered by the GIT project as an autonomous vulnerability (Cve-2024-52006CVSS’s assessment: 2.1) and addressed to Version V2.48.1.

“This vulnerability is related to the CVE-2020-5260, but relies on behavior where the characters’ return characters are interpreted by some implementation as new lines,”-Github software engineer Taylor Blau – Note In a report of the CVE-2024-52006.

The last version is also a patches Cve-2024-50349 (CVSS assessment: 2.1), which can be used by an enemy for craft containing shoot sequences to cheat users to provide their credentials to arbitrary sites.

Users are advised to update the latest version to protect against these vulnerabilities. If immediate correction is not an option, the risk-related risk can be softened, avoiding the Git clone launch due to the deposit deposit. It is also recommended not to use an account assistant, only cloning public meetings.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.