CVE-2025-54586

7.1 HIGH

📋 TL;DR

GitProxy versions 1.19.1 and below allow attackers to inject hidden commits into Git packs sent to GitHub. These commits don't appear in branch history but remain accessible via direct URLs, enabling data exfiltration without visible traces. Organizations using vulnerable GitProxy versions are affected.

💻 Affected Systems

Products:
  • GitProxy
Versions: 1.19.1 and below
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects GitProxy deployments that proxy Git operations to GitHub.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of repository confidentiality with sensitive data exfiltrated without detection in version control history.

🟠

Likely Case

Attackers exfiltrate source code, credentials, or other sensitive data from private repositories.

🟢

If Mitigated

No data exfiltration occurs due to proper access controls and monitoring.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker access to GitProxy endpoint and knowledge of target repository structure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.19.2

Vendor Advisory: https://github.com/finos/git-proxy/security/advisories/GHSA-v98g-8rqx-g93g

Restart Required: Yes

Instructions:

1. Stop GitProxy service. 2. Update to version 1.19.2 via package manager or manual installation. 3. Restart GitProxy service. 4. Verify version with 'gitproxy --version'.

🔧 Temporary Workarounds

Disable GitProxy

linux

Temporarily disable GitProxy and use direct Git connections

sudo systemctl stop gitproxy
sudo systemctl disable gitproxy

🧯 If You Can't Patch

  • Implement strict network access controls to limit GitProxy exposure
  • Enable detailed logging of all GitProxy transactions and monitor for unusual patterns

🔍 How to Verify

Check if Vulnerable:

Check GitProxy version with 'gitproxy --version' or examine package version

Check Version:

gitproxy --version

Verify Fix Applied:

Confirm version is 1.19.2 or higher and test Git operations through proxy

📡 Detection & Monitoring

Log Indicators:

  • Unusual Git pack sizes
  • Multiple commit operations from single sources
  • Failed commit validations

Network Indicators:

  • Abnormal Git protocol traffic patterns
  • Large pack file transfers

SIEM Query:

source="gitproxy" AND (event="pack_upload" OR event="commit_push") AND size>threshold

🔗 References

📤 Share & Export