CVE-2020-27955:
Git LFS can execute a Git binary from the current directory
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99698%
CWE
Published
2/11/2022
Updated
2/1/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/git-lfs/git-lfs | go | < 2.12.1 | 2.12.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from how Git LFS executes Git commands via subprocess.ExecCommand. The function calls exec.Command(name, arg...) where 'name' is 'git' without a path. On Windows, this triggers the OS to search the current directory first for executables (CWE-427). The provided code example and advisory explicitly show this pattern, making this function the root cause. No other functions are mentioned in the context as contributing to this specific vulnerability.