Does it? The attacker needs to be able to control the contents of your .git directory, which is not copied by git clone. Git cloning a repository will not leave you vulnerable, this is why the PoC gets the reproducer with wget.

Getting a git repo without a 'git clone' is a vector for this kind of attack: git hooks can run arbitrary code, so if you copy a .git directory in full from an untrusted source, you're vulnerable. Your security model needs to be that a .git directory can execute arbitrary code. Downloading it, rather than cloning it, is not secure.

In other news, if someone is sitting in your living room, they can unlock your front door from the inside, so your locks must be defective!


Follow

@ori I don't know, have none of the tarballs you have downloaded ever contained a .git?

On MacOS, you have metadata on downloaded files and get warned when you try to execute it. Maybe FLOSS also needs that, in desktops and shells like Emacs.

[ I wonder what does ]

Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.