GitProxy is an application that stands between developers and a Git remote endpoint. In versions 1.19.1 and below, attackers can exploit the way GitProxy handles new branch creation to bypass the approval of prior commits on the parent branch. The vulnerability impacts all users or organizations relying on GitProxy to enforce policy and prevent unapproved changes. It requires no elevated privileges beyond regular push access, and no extra user interaction. It does however, require a GitProxy administrator or designated user (canUserApproveRejectPush) to approve pushes to the child branch. This is fixed in version 1.19.2.
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
https://github.com/finos/git-proxy/security/advisories/GHSA-39p2-8hq9-fwj6 | exploit third party advisory |
https://github.com/finos/git-proxy/commit/a620a2f33c39c78e01783a274580bf822af3cc3a | patch |
https://github.com/finos/git-proxy/commit/f99fe42082eab0970e4cd0acdc3421a527a7e531 | patch |
https://github.com/finos/git-proxy/releases/tag/v1.19.2 | patch release notes |