{"id":"CVE-2019-1387","details":"An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. Recursive clones are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones.","modified":"2026-04-16T01:43:37.514484644Z","published":"2019-12-18T21:15:13.820Z","related":["SUSE-SU-2019:3311-1","SUSE-SU-2020:0045-1","SUSE-SU-2020:1121-1","openSUSE-SU-2020:0123-1","openSUSE-SU-2020:0598-1","openSUSE-SU-2024:10786-1","openSUSE-SU-2024:10943-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/01/msg00019.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6UGTEOXWIYSM5KDZL74QD2GK6YQNQCP/"},{"type":"WEB","url":"https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u"},{"type":"WEB","url":"https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00009.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:4356"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0002"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0124"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0228"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202003-30"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202003-42"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/git/git","events":[{"introduced":"1d4361b0f344188ab5eec6dcea01f61a3a3a1670"},{"fixed":"caccc527ca7f4b3e6f4bb6775cbff94b27741482"},{"introduced":"2512f15446149235156528dafbe75930c712b29e"},{"fixed":"eb288bc455ac67e3ceeff90daf6f25972bb586d0"},{"introduced":"4384e3cde2ce8ecd194202e171ae16333d241326"},{"fixed":"66d2a6159f511924e7e0b8a21c93538879bfd622"},{"introduced":"468165c1d8a442994a825f3684528361727cd8c0"},{"fixed":"a5ab8d03173458b76b8452efd90a7173f490c132"},{"introduced":"53f9a3e157dbbc901a02ac2c73346d375e24978c"},{"fixed":"9877106b01cbd346b862cc8cd2c52e496dd40ed5"},{"introduced":"5d826e972970a784bd7a7bdf587512510097b8c7"},{"fixed":"4cd1cf31efed9b16db5035c377bfa222f5272458"},{"introduced":"b697d92f56511e804b8ba20ccbe7bdc85dc66810"},{"fixed":"d9589d4051537c387b70dc76e430c61b4c85a86d"},{"introduced":"cb5918aa0d50f50e83787f65c2ddc3dcb10159fe"},{"fixed":"7cdafcaacf677b9e0700fa988c247bda192db48d"}]}],"versions":["v2.14.5","v2.14.6","v2.15.3","v2.15.4","v2.16.5","v2.16.6","v2.17.2","v2.17.3","v2.18.1","v2.18.2","v2.19.0","v2.19.1","v2.19.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-1387.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}