GitProxy is an application that stands between developers and a Git remote endpoint (e.g., github.com). In versions 1.19.1 and below, an attacker can craft a malicious Git packfile to exploit the PACK signature detection in the parsePush.ts file. By embedding a misleading PACK signature within commit content and carefully constructing the packet structure, the attacker can trick the parser into treating invalid or unintended data as the packfile. Potentially, this would allow bypassing approval or hiding commits. This issue is fixed in version 1.19.2.
Metrics
Affected Vendors & Products
References
History
Fri, 01 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Finos gitproxy
|
|
| CPEs | cpe:2.3:a:finos:gitproxy:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Finos gitproxy
|
|
| Metrics |
cvssV3_1
|
Thu, 31 Jul 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Finos
Finos git-proxy |
|
| Vendors & Products |
Finos
Finos git-proxy |
Wed, 30 Jul 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 30 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GitProxy is an application that stands between developers and a Git remote endpoint (e.g., github.com). In versions 1.19.1 and below, an attacker can craft a malicious Git packfile to exploit the PACK signature detection in the parsePush.ts file. By embedding a misleading PACK signature within commit content and carefully constructing the packet structure, the attacker can trick the parser into treating invalid or unintended data as the packfile. Potentially, this would allow bypassing approval or hiding commits. This issue is fixed in version 1.19.2. | |
| Title | GitProxy is vulnerable to a packfile parsing exploit | |
| Weaknesses | CWE-115 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-30T20:01:16.338Z
Updated: 2025-07-30T20:19:21.613Z
Reserved: 2025-07-25T16:19:16.093Z
Link: CVE-2025-54584
Updated: 2025-07-30T20:19:11.836Z
Status : Analyzed
Published: 2025-07-30T20:15:38.357
Modified: 2025-08-01T20:04:28.420
Link: CVE-2025-54584
No data.