# Git 递归克隆远程代码执行漏洞
## 漏洞概述
Git在处理子模块时存在一个漏洞,导致攻击者可以构造特定的仓库来利用此漏洞,将文件写入`.git/`目录而不是子模块的工作树中,从而在克隆操作过程中执行恶意代码。
## 影响版本
- 2.45.1
- 2.44.1
- 2.43.4
- 2.42.2
- 2.41.1
- 2.40.2
- 2.39.4
版本2.45.1、2.44.1、2.43.4、2.42.2、2.41.1、2.40.2 和 2.39.4已修复此漏洞。
## 细节
攻击者可以通过构造特定的Git仓库来利用此漏洞,将文件写入子模块的`.git/`目录中。这会导致攻击者编写并执行hook脚本,用户在克隆操作时没有机会检查正在执行的代码。如果在Git中禁用符号链接支持(例如通过配置`git config --global core.symlinks false`),则此攻击无法成功。
## 影响
此次漏洞允许攻击者在用户克隆仓库时执行恶意代码,对用户系统产生潜在威胁。建议不要从不可信来源克隆仓库,并且升级到上述版本以修复此漏洞。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | None | https://github.com/Disseminator/CVE-2024-32002 | POC详情 |
2 | A submodule for exploiting CVE-2024-32002 vulnerability. | https://github.com/markuta/hooky | POC详情 |
3 | Exploit PoC for CVE-2024-32002 | https://github.com/amalmurali47/git_rce | POC详情 |
4 | Hook for the PoC for exploiting CVE-2024-32002 | https://github.com/amalmurali47/hook | POC详情 |
5 | local poc for CVE-2024-32002 | https://github.com/M507/CVE-2024-32002 | POC详情 |
6 | CVE-2024-32002 RCE PoC | https://github.com/safebuffer/CVE-2024-32002 | POC详情 |
7 | None | https://github.com/10cks/CVE-2024-32002-POC | POC详情 |
8 | None | https://github.com/10cks/CVE-2024-32002-hulk | POC详情 |
9 | None | https://github.com/10cks/CVE-2024-32002-submod | POC详情 |
10 | None | https://github.com/10cks/CVE-2024-32002-smash | POC详情 |
11 | None | https://github.com/10cks/CVE-2024-32002-linux-hulk | POC详情 |
12 | None | https://github.com/10cks/CVE-2024-32002-linux-submod | POC详情 |
13 | None | https://github.com/10cks/CVE-2024-32002-linux-smash | POC详情 |
14 | None | https://github.com/aitorcastel/poc_CVE-2024-32002 | POC详情 |
15 | None | https://github.com/aitorcastel/poc_CVE-2024-32002_submodule | POC详情 |
16 | CVE-2024-32002-hook | https://github.com/10cks/hook | POC详情 |
17 | None | https://github.com/jweny/CVE-2024-32002_HOOK | POC详情 |
18 | None | https://github.com/jweny/CVE-2024-32002_EXP | POC详情 |
19 | None | https://github.com/CrackerCat/CVE-2024-32002_EXP | POC详情 |
20 | None | https://github.com/KiranKumarK20/CVE-2024-32002 | POC详情 |
21 | None | https://github.com/jerrydotlam/cve-2024-32002-1 | POC详情 |
22 | None | https://github.com/jerrydotlam/cve-2024-32002-2 | POC详情 |
23 | None | https://github.com/jerrydotlam/cve-2024-32002-3 | POC详情 |
24 | None | https://github.com/1mxml/CVE-2024-32002-poc | POC详情 |
25 | CVE-2024-32002 hook POC | https://github.com/Roronoawjd/hook | POC详情 |
26 | None | https://github.com/JakobTheDev/cve-2024-32002-submodule-rce | POC详情 |
27 | None | https://github.com/JakobTheDev/cve-2024-32002-poc-rce | POC详情 |
28 | CVE-2024-32002 POC | https://github.com/Roronoawjd/git_rce | POC详情 |
29 | Este script demuestra cómo explotar la vulnerabilidad CVE-2024-32002 para obtener una reverse shell, proporcionando acceso remoto al sistema afectado. Úselo con precaución en entornos controlados y solo con fines educativos o de pruebas de seguridad. | https://github.com/JJoosh/CVE-2024-32002-Reverse-Shell | POC详情 |
30 | None | https://github.com/YuanlooSec/CVE-2024-32002-poc | POC详情 |
31 | None | https://github.com/bfengj/CVE-2024-32002-hook | POC详情 |
32 | None | https://github.com/ycdxsb/CVE-2024-32002-hulk | POC详情 |
33 | None | https://github.com/ycdxsb/CVE-2024-32002-submod | POC详情 |
34 | None | https://github.com/bfengj/CVE-2024-32002-Exploit | POC详情 |
35 | Repo for testing CVE-2024-32002 | https://github.com/vincepsh/CVE-2024-32002 | POC详情 |
36 | CVE-2024-32002-hook | https://github.com/vincepsh/CVE-2024-32002-hook | POC详情 |
37 | None | https://github.com/10cks/CVE-2024-32002-EXP | POC详情 |
38 | PoC Exploit for CVE-2024-32002 | https://github.com/WOOOOONG/CVE-2024-32002 | POC详情 |
39 | PoC Exploit for CVE-2024-32002 | https://github.com/WOOOOONG/hook | POC详情 |
40 | poc of git rce using cve-2024-32002 | https://github.com/fadhilthomas/poc-cve-2024-32002 | POC详情 |
41 | part of poc cve-2024-32002 | https://github.com/fadhilthomas/hook | POC详情 |
42 | A submodule to demonstrate CVE-2024-32002. Demonstrates arbitrary write into .git. | https://github.com/JakobTheDev/cve-2024-32002-submodule-aw | POC详情 |
43 | A POC for CVE-2024-32002 demonstrating arbitrary write into the .git directory. | https://github.com/JakobTheDev/cve-2024-32002-poc-aw | POC详情 |
44 | None | https://github.com/markuta/CVE-2024-32002 | POC详情 |
45 | None | https://github.com/Goplush/CVE-2024-32002-git-rce | POC详情 |
46 | None | https://github.com/TanMolk/CVE-2024-32002-sub | POC详情 |
47 | None | https://github.com/TanMolk/CVE-2024-32002 | POC详情 |
48 | CVE-2024-32002wakuwaku | https://github.com/AD-Appledog/CVE-2024-32002 | POC详情 |
49 | cve-2024-32002yahhh | https://github.com/AD-Appledog/wakuwaku | POC详情 |
50 | https://www.cve.org/CVERecord?id=CVE-2024-32002 | https://github.com/tobelight/cve_2024_32002 | POC详情 |
51 | CVE-2024-32002 poc test | https://github.com/431m/rcetest | POC详情 |
52 | none | https://github.com/Basyaact/CVE-2024-32002-PoC_Chinese | POC详情 |
53 | None | https://github.com/alimuhammedkose/CVE-2024-32002-linux-smash | POC详情 |
54 | None | https://github.com/Hector65432/cve-2024-32002-1 | POC详情 |
55 | None | https://github.com/Hector65432/cve-2024-32002-2 | POC详情 |
56 | exploit for CVE-2024-32002 | https://github.com/bonnettheo/CVE-2024-32002 | POC详情 |
57 | None | https://github.com/AmbroseCdMeng/CVE-2024-32002 | POC详情 |
58 | None | https://github.com/AmbroseCdMeng/CVE-2024-32002-Hook | POC详情 |
59 | None | https://github.com/sysonlai/CVE-2024-32002-hook | POC详情 |
60 | None | https://github.com/TSY244/CVE-2024-32002-git-rce-father-poc | POC详情 |
61 | None | https://github.com/TSY244/CVE-2024-32002-git-rce | POC详情 |
62 | None | https://github.com/blackninja23/CVE-2024-32002 | POC详情 |
63 | A Reverse shell generator for gitlab-shell vulnerability cve 2024-32002 | https://github.com/daemon-reconfig/CVE-2024-32002 | POC详情 |
64 | RCE through git recursive cloning. | https://github.com/HexDoesRandomShit/CVE-2024-32002 | POC详情 |
65 | GIT RCE CVE-2024-32002 | https://github.com/charlesgargasson/CVE-2024-32002 | POC详情 |
66 | PoC of CVE-2024-32002 - Remote Code Execution while cloning special-crafted local repositories | https://github.com/NishanthAnand21/CVE-2024-32002-PoC | POC详情 |
67 | Just small script to exploit CVE-2024-32002 | https://github.com/tiyeume25112004/CVE-2024-32002 | POC详情 |
68 | None | https://github.com/mprunet/cve-2024-32002-malicious | POC详情 |
69 | None | https://github.com/mprunet/cve-2024-32002-pull | POC详情 |
70 | None | https://github.com/chrisWalker11/CVE-2024-32002 | POC详情 |
71 | RCE through git recursive cloning. | https://github.com/h3xm4n/CVE-2024-32002 | POC详情 |
72 | adapting CVE-2024-32002 for running offline and locally | https://github.com/chrisWalker11/running-CVE-2024-32002-locally-for-tesing | POC详情 |
73 | POC | https://github.com/sanan2004/CVE-2024-32002 | POC详情 |
74 | None | https://github.com/FlojBoj/CVE-2024-32002 | POC详情 |
75 | This is the main repository for CVE 2024-32002, and requires recursive cloning because it contains the submodels necessary for execution. | https://github.com/JJoosh/CVE-2024-32002 | POC详情 |
76 | git clone rce CVE-2024-32002 | https://github.com/EQSTLab/git_rce | POC详情 |
77 | This is a demo for CVE-2024-32002 POC | https://github.com/Masamuneee/hook | POC详情 |
78 | This is a demo for CVE-2024-32002 POC | https://github.com/Masamuneee/CVE-2024-32002-POC | POC详情 |
79 | Proof of Concept for CVE-2024-32002 | https://github.com/th4s1s/CVE-2024-32002-PoC | POC详情 |
80 | hihihihaa | https://github.com/Julian-gmz/hook_CVE-2024-32002 | POC详情 |
81 | None | https://github.com/grecosamuel/CVE-2024-32002 | POC详情 |
82 | CVE-2024-32002 是 Git 中的一个严重漏洞,允许攻击者在用户执行 git clone 操作时远程执行任意代码(RCE)。 | https://github.com/XiaomingX/CVE-2024-32002-poc | POC详情 |
83 | CVE-2024-32002 是 Git 中的一个严重漏洞,允许攻击者在用户执行 git clone 操作时远程执行任意代码(RCE)。 | https://github.com/XiaomingX/cve-2024-32002-poc | POC详情 |
84 | Just small script to exploit CVE-2024-32002 | https://github.com/SpycioKon/CVE-2024-32002 | POC详情 |
85 | An example of a repo that would make use of the CVE-2024-32002 | https://github.com/jolibb55/donald | POC详情 |
86 | None | https://github.com/Katherine-song/CVE-2024-32002 | POC详情 |
87 | Este script demuestra cómo explotar la vulnerabilidad CVE-2024-32002 para obtener una reverse shell, proporcionando acceso remoto al sistema afectado. Úselo con precaución en entornos controlados y solo con fines educativos o de pruebas de seguridad. | https://github.com/YukaFake/CVE-2024-32002-Reverse-Shell | POC详情 |
88 | This is the main repository for CVE 2024-32002, and requires recursive cloning because it contains the submodels necessary for execution. | https://github.com/YukaFake/CVE-2024-32002 | POC详情 |
89 | Repository for demonstrating CVE-2024-32002 | https://github.com/razenkovv/captain | POC详情 |
90 | Repository for demonstrating CVE-2024-32002 - 2 | https://github.com/razenkovv/hook | POC详情 |
91 | This repository contains a PoC for exploiting CVE-2024-32002, a vulnerability in Git that allows RCE during a git clone operation. By crafting repositories with submodules in a specific way, an attacker can exploit symlink handling on case-insensitive filesystems to write files into the .git/ directory, leading to the execution of malicious hooks. | https://github.com/ashutosh0408/CVE-2024-32002 | POC详情 |
92 | This repository contains a PoC for exploiting CVE-2024-32002, a vulnerability in Git that allows RCE during a git clone operation. By crafting repositories with submodules in a specific way, an attacker can exploit symlink handling on case-insensitive filesystems to write files into the .git/ directory, leading to the execution of malicious hooks. | https://github.com/ashutosh0408/Cve-2024-32002-poc | POC详情 |
93 | cve-2024-32002 | https://github.com/Dre4m017/fuzzy | POC详情 |
暂无评论