Bugzilla – Bug 1178459
VUL-0: CVE-2020-27955: git-lfs: Remote Code Execution on Windows
Last modified: 2020-11-05 09:00:05 UTC
CVE-2020-27955 On Windows, if Git LFS operates on a malicious repository with a git.bat or git.exe file in the current directory, that program is executed, permitting the attacker to execute arbitrary code. This security problem does not affect Unix systems. This occurs because on Windows, Go includes (and prefers) the current directory when the name of a command run does not contain a directory separator. This has been solved by always using PATH to pre-resolve paths before handing them to Go. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27955 http://seclists.org/oss-sec/2020/q4/98 https://legalhackers.com/advisories/Git-LFS-RCE-Exploit-CVE-2020-27955.html https://exploitbox.io/vuln/Git-Git-LFS-RCE-Exploit-CVE-2020-27955.html
There is already a fixed version which fixes this issue, that is 2.12.1. Anyway this is a Windows only issue, closing.