{"id":"CVE-2024-52006","summary":"Newline confusion in credential helpers can lead to credential exfiltration in git","details":"Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. Git defines a line-based protocol that is used to exchange information between Git and Git credential helpers. Some ecosystems (most notably, .NET and node.js) interpret single Carriage Return characters as newlines, which renders the protections against CVE-2020-5260 incomplete for credential helpers that treat Carriage Returns in this way. This issue has been addressed in commit `b01b9b8` which is included in release versions v2.48.1, v2.47.2, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4, v2.41.3, and v2.40.4. Users are advised to upgrade. Users unable to upgrade should avoid cloning from untrusted URLs, especially recursive clones.","aliases":["BIT-git-2024-52006"],"modified":"2026-04-16T04:40:27.625264050Z","published":"2025-01-14T18:39:52.748Z","related":["ALSA-2025:11462","ALSA-2025:11533","ALSA-2025:11534","CGA-9hcc-vp2r-7hmh","GHSA-86c2-4x57-wc8g","GHSA-qm7j-c969-7j4q","GHSA-r5ph-xg7q-xfrp","SUSE-RU-2025:20362-1","SUSE-SU-2025:0116-1","SUSE-SU-2025:0144-1","SUSE-SU-2025:0197-1","SUSE-SU-2025:20197-1","SUSE-SU-2025:20721-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/52xxx/CVE-2024-52006.json","cwe_ids":["CWE-116","CWE-147","CWE-150"],"cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00025.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/52xxx/CVE-2024-52006.json"},{"type":"ADVISORY","url":"https://github.com/git-ecosystem/git-credential-manager/security/advisories/GHSA-86c2-4x57-wc8g"},{"type":"ADVISORY","url":"https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q"},{"type":"ADVISORY","url":"https://github.com/git/git/security/advisories/GHSA-r5ph-xg7q-xfrp"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-52006"},{"type":"FIX","url":"https://github.com/git/git/commit/b01b9b81d36759cdcd07305e78765199e1bc2060"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/git/git","events":[{"introduced":"0"},{"last_affected":"dbecc617f75eea6ee5d05823a38b91223ff22b11"},{"last_affected":"fbe8d3079d4a96aeb4e4529cc93cc0043b759a05"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.40.3"},{"last_affected":"= 2.48.0"}]}},{"type":"GIT","repo":"https://github.com/git/git","events":[{"introduced":"fe86abd7511a9a6862d5706c6fa1d9b57a63ba09"},{"last_affected":"0dc9cad22d5c878d2ce6ee7b5cfffb034e34b2a0"}],"database_specific":{"versions":[{"introduced":"2.41.0"},{"last_affected":"2.41.2"}]}},{"type":"GIT","repo":"https://github.com/git/git","events":[{"introduced":"43c8a30d150ecede9709c1f2527c8fba92c65f40"},{"last_affected":"239bd35bd2ed2791398714d99b43a344728766ab"}],"database_specific":{"versions":[{"introduced":"2.42.0"},{"last_affected":"2.42.3"}]}},{"type":"GIT","repo":"https://github.com/git/git","events":[{"introduced":"564d0252ca632e0264ed670534a51d18a689ef5d"},{"last_affected":"337b4d400023d22207bcc3c29e9ebab31bf96fc2"}],"database_specific":{"versions":[{"introduced":"2.43.0"},{"last_affected":"2.43.5"}]}},{"type":"GIT","repo":"https://github.com/git/git","events":[{"introduced":"3c2a3fdc388747b9eaf4a4a4f2035c1c9ddb26d0"},{"last_affected":"46698a8ea13f244aac74366d2ee66a88e92e001a"}],"database_specific":{"versions":[{"introduced":"2.44.0"},{"last_affected":"2.44.2"}]}},{"type":"GIT","repo":"https://github.com/git/git","events":[{"introduced":"786a3e4b8d754d2b14b1208b98eeb0a554ef19a8"},{"last_affected":"bea9ecd24b0c3bf06cab4a851694fe09e7e51408"}],"database_specific":{"versions":[{"introduced":"2.45.0"},{"last_affected":"2.45.2"}]}},{"type":"GIT","repo":"https://github.com/git/git","events":[{"introduced":"39bf06adf96da25b87c9aa7d35a32ef3683eb4a4"},{"last_affected":"4f71522dfb7fc53eff569023303980c66114b1bc"}],"database_specific":{"versions":[{"introduced":"2.46.0"},{"last_affected":"2.46.2"}]}},{"type":"GIT","repo":"https://github.com/git/git","events":[{"introduced":"777489f9e09c8d0dd6b12f9d90de6376330577a2"},{"fixed":"e1fbebe347426ef7974dc2198f8a277b7c31c8fe"}],"database_specific":{"versions":[{"introduced":"2.47.0"},{"fixed":"2.47.2"}]}}],"versions":["v0.99","v0.99.1","v0.99.2","v0.99.3","v0.99.4","v0.99.5","v0.99.6","v0.99.7","v0.99.8","v0.99.8a","v0.99.8b","v0.99.8c","v0.99.8d","v0.99.8e","v0.99.8f","v0.99.8g","v0.99.9a","v0.99.9b","v0.99.9c","v0.99.9d","v0.99.9e","v0.99.9f","v0.99.9g","v0.99.9h","v0.99.9i","v0.99.9j","v0.99.9k","v0.99.9l","v0.99.9m","v0.99.9n","v1.0.0","v1.0rc1","v1.0rc2","v1.0rc3","v1.0rc4","v1.0rc5","v1.0rc6","v1.1.0","v1.2.0","v1.3.0-rc1","v1.4.1","v1.4.1-rc1","v1.4.1-rc2","v1.4.2","v1.4.2-rc1","v1.4.2-rc2","v1.4.2-rc3","v1.4.2-rc4","v1.4.3","v1.4.3-rc1","v1.4.3-rc2","v1.4.3-rc3","v1.4.4","v1.4.4-rc1","v1.4.4-rc2","v1.4.4.1","v1.5.0","v1.5.0-rc0","v1.5.0-rc1","v1.5.0-rc2","v1.5.0-rc3","v1.5.0-rc4","v1.5.1","v1.5.1-rc1","v1.5.1-rc2","v1.5.1-rc3","v1.5.2","v1.5.2-rc0","v1.5.2-rc1","v1.5.2-rc2","v1.5.2-rc3","v1.5.3","v1.5.3-rc0","v1.5.3-rc1","v1.5.3-rc2","v1.5.3-rc3","v1.5.3-rc4","v1.5.3-rc5","v1.5.3-rc6","v1.5.3-rc7","v1.5.3.1","v1.5.4","v1.5.4-rc0","v1.5.4-rc1","v1.5.4-rc2","v1.5.4-rc3","v1.5.4-rc4","v1.5.4-rc5","v1.5.5","v1.5.5-rc0","v1.5.5-rc1","v1.5.5-rc2","v1.5.5-rc3","v1.5.6","v1.5.6-rc0","v1.5.6-rc1","v1.5.6-rc2","v1.5.6-rc3","v1.6.0","v1.6.0-rc0","v1.6.0-rc1","v1.6.0-rc2","v1.6.0-rc3","v1.6.1","v1.6.1-rc1","v1.6.1-rc2","v1.6.1-rc3","v1.6.1-rc4","v1.6.2","v1.6.2-rc0","v1.6.2-rc1","v1.6.2-rc2","v1.6.3","v1.6.3-rc0","v1.6.3-rc1","v1.6.3-rc2","v1.6.3-rc3","v1.6.3-rc4","v1.6.4","v1.6.4-rc0","v1.6.4-rc1","v1.6.4-rc2","v1.6.4-rc3","v1.6.5","v1.6.5-rc0","v1.6.5-rc1","v1.6.5-rc2","v1.6.5-rc3","v1.6.6","v1.6.6-rc0","v1.6.6-rc1","v1.6.6-rc2","v1.6.6-rc3","v1.6.6-rc4","v1.7.0","v1.7.0-rc0","v1.7.0-rc1","v1.7.0-rc2","v1.7.1","v1.7.1-rc0","v1.7.1-rc1","v1.7.1-rc2","v1.7.10","v1.7.10-rc0","v1.7.10-rc1","v1.7.10-rc2","v1.7.10-rc3","v1.7.10-rc4","v1.7.11","v1.7.11-rc0","v1.7.11-rc1","v1.7.11-rc2","v1.7.11-rc3","v1.7.12","v1.7.12-rc0","v1.7.12-rc1","v1.7.12-rc2","v1.7.12-rc3","v1.7.2","v1.7.2-rc0","v1.7.2-rc1","v1.7.2-rc2","v1.7.2-rc3","v1.7.3","v1.7.3-rc0","v1.7.3-rc1","v1.7.3-rc2","v1.7.3.1","v1.7.4","v1.7.4-rc0","v1.7.4-rc1","v1.7.4-rc2","v1.7.4-rc3","v1.7.5","v1.7.5-rc0","v1.7.5-rc1","v1.7.5-rc2","v1.7.5-rc3","v1.7.6","v1.7.6-rc0","v1.7.6-rc1","v1.7.6-rc2","v1.7.6-rc3","v1.7.7","v1.7.7-rc0","v1.7.7-rc1","v1.7.7-rc2","v1.7.7-rc3","v1.7.8","v1.7.8-rc0","v1.7.8-rc1","v1.7.8-rc2","v1.7.8-rc3","v1.7.8-rc4","v1.7.9","v1.7.9-rc0","v1.7.9-rc1","v1.7.9-rc2","v1.8.0","v1.8.0-rc0","v1.8.0-rc1","v1.8.0-rc2","v1.8.0-rc3","v1.8.1","v1.8.1-rc0","v1.8.1-rc1","v1.8.1-rc2","v1.8.1-rc3","v1.8.2","v1.8.2-rc0","v1.8.2-rc1","v1.8.2-rc2","v1.8.2-rc3","v1.8.3","v1.8.3-rc0","v1.8.3-rc1","v1.8.3-rc2","v1.8.3-rc3","v1.8.4","v1.8.4-rc0","v1.8.4-rc1","v1.8.4-rc2","v1.8.4-rc3","v1.8.4-rc4","v1.8.5","v1.8.5-rc0","v1.8.5-rc1","v1.8.5-rc2","v1.8.5-rc3","v1.9-rc0","v1.9-rc1","v1.9-rc2","v1.9.0","v1.9.0-rc3","v2.0.0","v2.0.0-rc0","v2.0.0-rc1","v2.0.0-rc2","v2.0.0-rc3","v2.0.0-rc4","v2.1.0","v2.1.0-rc0","v2.1.0-rc1","v2.1.0-rc2","v2.10.0","v2.10.0-rc0","v2.10.0-rc1","v2.10.0-rc2","v2.11.0","v2.11.0-rc0","v2.11.0-rc1","v2.11.0-rc2","v2.11.0-rc3","v2.12.0","v2.12.0-rc0","v2.12.0-rc1","v2.12.0-rc2","v2.13.0","v2.13.0-rc0","v2.13.0-rc1","v2.13.0-rc2","v2.14.0","v2.14.0-rc0","v2.14.0-rc1","v2.15.0","v2.15.0-rc0","v2.15.0-rc1","v2.15.0-rc2","v2.16.0","v2.16.0-rc0","v2.16.0-rc1","v2.16.0-rc2","v2.17.0","v2.17.0-rc0","v2.17.0-rc1","v2.17.0-rc2","v2.18.0","v2.18.0-rc0","v2.18.0-rc1","v2.18.0-rc2","v2.19.0","v2.19.0-rc0","v2.19.0-rc1","v2.19.0-rc2","v2.2.0","v2.2.0-rc0","v2.2.0-rc1","v2.2.0-rc2","v2.2.0-rc3","v2.20.0","v2.20.0-rc0","v2.20.0-rc1","v2.20.0-rc2","v2.21.0","v2.21.0-rc0","v2.21.0-rc1","v2.21.0-rc2","v2.22.0","v2.22.0-rc0","v2.22.0-rc1","v2.22.0-rc2","v2.22.0-rc3","v2.23.0","v2.23.0-rc0","v2.23.0-rc1","v2.23.0-rc2","v2.24.0","v2.24.0-rc0","v2.24.0-rc1","v2.24.0-rc2","v2.25.0","v2.25.0-rc0","v2.25.0-rc1","v2.25.0-rc2","v2.26.0","v2.26.0-rc0","v2.26.0-rc1","v2.26.0-rc2","v2.27.0","v2.27.0-rc0","v2.27.0-rc1","v2.27.0-rc2","v2.28.0","v2.28.0-rc0","v2.28.0-rc1","v2.28.0-rc2","v2.29.0","v2.29.0-rc0","v2.29.0-rc1","v2.29.0-rc2","v2.3.0","v2.3.0-rc0","v2.3.0-rc1","v2.3.0-rc2","v2.30.0","v2.30.0-rc0","v2.30.0-rc1","v2.30.0-rc2","v2.31.0","v2.31.0-rc0","v2.31.0-rc1","v2.31.0-rc2","v2.32.0","v2.32.0-rc0","v2.32.0-rc1","v2.32.0-rc2","v2.32.0-rc3","v2.33.0","v2.33.0-rc0","v2.33.0-rc1","v2.33.0-rc2","v2.34.0","v2.34.0-rc0","v2.34.0-rc1","v2.34.0-rc2","v2.35.0","v2.35.0-rc0","v2.35.0-rc1","v2.35.0-rc2","v2.36.0","v2.36.0-rc0","v2.36.0-rc1","v2.36.0-rc2","v2.37.0","v2.37.0-rc0","v2.37.0-rc1","v2.37.0-rc2","v2.38.0","v2.38.0-rc0","v2.38.0-rc1","v2.38.0-rc2","v2.39.0","v2.39.0-rc0","v2.39.0-rc1","v2.39.0-rc2","v2.4.0","v2.4.0-rc0","v2.4.0-rc1","v2.4.0-rc2","v2.4.0-rc3","v2.40.0","v2.40.0-rc0","v2.40.0-rc1","v2.40.0-rc2","v2.40.1","v2.40.2","v2.40.3","v2.41.0","v2.41.0-rc0","v2.41.0-rc1","v2.41.0-rc2","v2.41.1","v2.41.2","v2.42.0","v2.42.0-rc0","v2.42.0-rc1","v2.42.0-rc2","v2.42.1","v2.42.2","v2.42.3","v2.43.0","v2.43.0-rc0","v2.43.0-rc1","v2.43.0-rc2","v2.43.1","v2.43.2","v2.43.3","v2.43.4","v2.43.5","v2.44.0","v2.44.0-rc0","v2.44.0-rc1","v2.44.0-rc2","v2.44.1","v2.44.2","v2.45.0","v2.45.0-rc0","v2.45.0-rc1","v2.45.1","v2.45.2","v2.46.0","v2.46.0-rc0","v2.46.0-rc1","v2.46.0-rc2","v2.46.1","v2.46.2","v2.47.0","v2.47.0-rc0","v2.47.0-rc1","v2.47.1","v2.48.0","v2.48.0-rc0","v2.48.0-rc1","v2.48.0-rc2","v2.5.0","v2.5.0-rc0","v2.5.0-rc1","v2.5.0-rc2","v2.5.0-rc3","v2.6.0","v2.6.0-rc0","v2.6.0-rc1","v2.6.0-rc2","v2.6.0-rc3","v2.7.0","v2.7.0-rc0","v2.7.0-rc1","v2.7.0-rc2","v2.7.0-rc3","v2.8.0","v2.8.0-rc0","v2.8.0-rc1","v2.8.0-rc2","v2.8.0-rc3","v2.8.0-rc4","v2.9.0","v2.9.0-rc0","v2.9.0-rc1","v2.9.0-rc2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-52006.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"}]}