CVE-2022-39253: GitHub: CVE-2022-39253 Local clone optimization dereferences symbolic links by default

Overview

Severity
N/A
Category
Information Disclosure
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2022-Nov
Released
2022-11-08
EPSS Score
2.79% (percentile: 86.1%)

FAQ

What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Successful exploitation of this vulnerability requires a malicious actor to convince a victim to close a repository with a symbolic link pointing to sensitive information on a victim's machine. Why is this GitHub CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Git for Windows software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. For more information see: Local clone optimization dereferences symbolic links by default.

Detection & Weaponization (1 sources)

Maturity: Exploit

  • GitHub PoC: 2 repositories

Affected Products (5)

Developer Tools

  • Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
  • Microsoft Visual Studio 2022 version 17.3
  • Microsoft Visual Studio 2022 version 17.0
  • Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
  • Microsoft Visual Studio 2022 version 17.2

Security Updates (5)

Revision History

  • 2022-11-08: Information published.