Skip to main content
GitHub client exploited Started by Flavio93Zena · · Read 2386 times 0 Members and 1 Guest are viewing this topic. previous topic - next topic

Re: GitHub client exploited

Reply #1

I found some references on twitter few minutes ago and I was trying to understand:
http://git-blame.blogspot.com.es/2014/12/git-1856-195-205-214-and-221-and.html
http://stackoverflow.com/questions/27557021/are-remote-git-clients-vulnerable-to-cve-2014-9390-if-only-trusted-users-have-ss
In a very short summary: on file systems case-insensitive the .git directory could be overwritten pulling code from a remote repository where a directory with the same name, but different case (e.g. .Git or .gIT, etc.) is added to the repo (I think), that would allow the attacker to do some nasty things.
Bugs creator.
Features destroyer.
Template killer.

Re: GitHub client exploited

Reply #2

Just thought about telling all of you, in fact I don't even have an account on Git but you may have that client thing.
~ SimplePortal Support Team ~