{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T15:51:33.859","vulnerabilities":[{"cve":{"id":"CVE-2021-29468","sourceIdentifier":"security-advisories@github.com","published":"2021-04-29T21:15:08.550","lastModified":"2024-11-21T06:01:10.790","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cygwin Git is a patch set for the git command line tool for the cygwin environment. A specially crafted repository that contains symbolic links as well as files with backslash characters in the file name may cause just-checked out code to be executed while checking out a repository using Git on Cygwin. The problem will be patched in the Cygwin Git v2.31.1-2 release. At time of writing, the vulnerability is present in the upstream Git source code; any Cygwin user who compiles Git for themselves from upstream sources should manually apply a patch to mitigate the vulnerability. As mitigation users should not clone or pull from repositories from untrusted sources. CVE-2019-1354 was an equivalent vulnerability in Git for Visual Studio."},{"lang":"es","value":"Cygwin Git es un conjunto de parches para la herramienta de línea de comandos git para el entorno cygwin.&#xa0;Un repositorio especialmente diseñado que contiene enlaces simbólicos, así como archivos con caracteres de backslash en el nombre del archivo, puede hacer que se ejecute el código recién extraído al comprobar un repositorio usando Git en Cygwin.&#xa0;El problema se parcheará en Cygwin Git versión v2.31.1-2.&#xa0;En el momento de escribir este artículo, la vulnerabilidad está presente aguas arriba del código fuente de Git;&#xa0;Cualquier usuario de Cygwin que compile Git por sí mismo desde fuentes ascendentes debe aplicar manualmente un parche para mitigar la vulnerabilidad.&#xa0;Como mitigación, los usuarios no deben clonar ni extraer de repositorios de fuentes que no sean confiables.&#xa0;CVE-2019-1354 era una vulnerabilidad equivalente en Git para Visual Studio."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cygwin:git:*:*:*:*:*:*:*:*","versionEndIncluding":"2.31.1-1","matchCriteriaId":"966B34C6-5223-4E8C-B286-069B97E5FEAF"}]}]}],"references":[{"url":"https://cygwin.com/pipermail/cygwin-announce/2021-April/010018.html","source":"security-advisories@github.com","tags":["Mailing List","Patch","Vendor Advisory"]},{"url":"https://github.com/me-and/Cygwin-Git/blob/main/check-backslash-safety.patch","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/me-and/Cygwin-Git/security/advisories/GHSA-rmp3-wq55-f557","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://lore.kernel.org/git/CA+kUOa=juEdBMVr_gyTKjz7PkPt2DZHkXQyzcQmAWCsEHC_ssw%40mail.gmail.com/T/#u","source":"security-advisories@github.com"},{"url":"https://cygwin.com/pipermail/cygwin-announce/2021-April/010018.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Patch","Vendor Advisory"]},{"url":"https://github.com/me-and/Cygwin-Git/blob/main/check-backslash-safety.patch","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/me-and/Cygwin-Git/security/advisories/GHSA-rmp3-wq55-f557","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://lore.kernel.org/git/CA+kUOa=juEdBMVr_gyTKjz7PkPt2DZHkXQyzcQmAWCsEHC_ssw%40mail.gmail.com/T/#u","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}