{"api_version":"1","generated_at":"2026-04-23T04:10:35+00:00","cve":"CVE-2019-1353","urls":{"html":"https://cve.report/CVE-2019-1353","api":"https://cve.report/api/cve/CVE-2019-1353.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-1353","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-1353"},"summary":{"title":"CVE-2019-1353","description":"An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. When running Git in the Windows Subsystem for Linux (also known as \"WSL\") while accessing a working directory on a regular Windows drive, none of the NTFS protections were active.","state":"PUBLIC","assigner":"secure@microsoft.com","published_at":"2020-01-24 22:15:00","updated_at":"2023-11-07 03:08:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html","name":"openSUSE-SU-2020:0123","refsource":"SUSE","tags":["Mailing List","Third Party Advisory"],"title":"[security-announce] openSUSE-SU-2020:0123-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html","name":"openSUSE-SU-2020:0598","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2020:0598-1: moderate: Security update f","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/","name":"https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/","refsource":"","tags":[],"title":"[ANNOUNCE] Git v2.24.1 and others - Junio C Hamano","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lore.kernel.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/T/#u","name":"https://lore.kernel.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/T/#u","refsource":"MISC","tags":["Release Notes","Third Party Advisory"],"title":"[ANNOUNCE] Git v2.24.1 and others","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/202003-30","name":"GLSA-202003-30","refsource":"GENTOO","tags":[],"title":"Git: Multiple vulnerabilities (GLSA 202003-30) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u","name":"https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u","refsource":"","tags":[],"title":"[ANNOUNCE] Git v2.24.1 and others","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/","name":"https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/","refsource":"MISC","tags":["Release Notes","Third Party Advisory"],"title":"[ANNOUNCE] Git v2.24.1 and others - Junio C Hamano","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-1353","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-1353","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"1353","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"git-scm","cpe5":"git","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"1353","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"git-scm","cpe5":"git","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"1353","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"leap","cpe6":"15.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"1353","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"leap","cpe6":"15.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2019-1353","qid":"179136","title":"Debian Security Update for libgit2 (DLA 2936-1)"},{"cve":"CVE-2019-1353","qid":"296076","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 19.3.0 Missing (CPUJAN2020)"},{"cve":"CVE-2019-1353","qid":"354769","title":"Amazon Linux Security Advisory for git : ALAS2-2023-1943"},{"cve":"CVE-2019-1353","qid":"500219","title":"Alpine Linux Security Update for git"},{"cve":"CVE-2019-1353","qid":"501038","title":"Alpine Linux Security Update for libgit2"},{"cve":"CVE-2019-1353","qid":"501603","title":"Alpine Linux Security Update for libgit2-1.0"},{"cve":"CVE-2019-1353","qid":"502112","title":"Alpine Linux Security Update for libgit2-1.1"},{"cve":"CVE-2019-1353","qid":"503963","title":"Alpine Linux Security Update for git"},{"cve":"CVE-2019-1353","qid":"505001","title":"Alpine Linux Security Update for libgit2"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2019-1353","ASSIGNER":"secure@microsoft.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Microsoft Corporation","product":{"product_data":[{"product_name":"Git","version":{"version_data":[{"version_value":"Before 2.24.1, 2.23.1, 2.22.2, 2.21.1, 2.20.2, 2.19.3, 2.18.2, 2.17.3, 2.16.6, 2.15.4, 2.14.6"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Remote Code Execution"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://lore.kernel.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/T/#u","url":"https://lore.kernel.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/T/#u"},{"refsource":"MISC","name":"https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/","url":"https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/"},{"refsource":"SUSE","name":"openSUSE-SU-2020:0123","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html"},{"refsource":"GENTOO","name":"GLSA-202003-30","url":"https://security.gentoo.org/glsa/202003-30"},{"refsource":"SUSE","name":"openSUSE-SU-2020:0598","url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html"}]},"description":{"description_data":[{"lang":"eng","value":"An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. When running Git in the Windows Subsystem for Linux (also known as \"WSL\") while accessing a working directory on a regular Windows drive, none of the NTFS protections were active."}]}},"nvd":{"publishedDate":"2020-01-24 22:15:00","lastModifiedDate":"2023-11-07 03:08:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*","versionStartIncluding":"2.14.0","versionEndExcluding":"2.14.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*","versionStartIncluding":"2.15.0","versionEndExcluding":"2.15.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*","versionStartIncluding":"2.16.0","versionEndExcluding":"2.16.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*","versionStartIncluding":"2.17.0","versionEndExcluding":"2.17.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*","versionStartIncluding":"2.18.0","versionEndExcluding":"2.18.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*","versionStartIncluding":"2.19.0","versionEndExcluding":"2.19.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*","versionStartIncluding":"2.20.0","versionEndExcluding":"2.20.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*","versionStartIncluding":"2.21.0","versionEndExcluding":"2.21.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*","versionStartIncluding":"2.22.0","versionEndExcluding":"2.22.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*","versionStartIncluding":"2.23.0","versionEndExcluding":"2.23.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*","versionStartIncluding":"2.24.0","versionEndExcluding":"2.24.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"1353","Ordinal":"137767","Title":"CVE-2019-1353","CVE":"CVE-2019-1353","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"1353","Ordinal":"1","NoteData":"An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. When running Git in the Windows Subsystem for Linux (also known as \"WSL\") while accessing a working directory on a regular Windows drive, none of the NTFS protections were active.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"1353","Ordinal":"2","NoteData":"2020-01-24","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"1353","Ordinal":"3","NoteData":"2020-05-01","Type":"Other","Title":"Modified"}]}}}