GitProxy is an application that stands between developers and a Git remote endpoint (e.g., github.com). In versions 1.19.1 and below, an attacker can craft a malicious Git packfile to exploit the PACK signature detection in the parsePush.ts file. By embedding a misleading PACK signature within commit content and carefully constructing the packet structure, the attacker can trick the parser into treating invalid or unintended data as the packfile. Potentially, this would allow bypassing approval or hiding commits. This issue is fixed in version 1.19.2.
Metrics
Affected Vendors & Products
References
History
Fri, 01 Aug 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Finos gitproxy
|
|
CPEs | cpe:2.3:a:finos:gitproxy:*:*:*:*:*:*:*:* | |
Vendors & Products |
Finos gitproxy
|
|
Metrics |
cvssV3_1
|
Thu, 31 Jul 2025 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Finos
Finos git-proxy |
|
Vendors & Products |
Finos
Finos git-proxy |
Wed, 30 Jul 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 30 Jul 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | GitProxy is an application that stands between developers and a Git remote endpoint (e.g., github.com). In versions 1.19.1 and below, an attacker can craft a malicious Git packfile to exploit the PACK signature detection in the parsePush.ts file. By embedding a misleading PACK signature within commit content and carefully constructing the packet structure, the attacker can trick the parser into treating invalid or unintended data as the packfile. Potentially, this would allow bypassing approval or hiding commits. This issue is fixed in version 1.19.2. | |
Title | GitProxy is vulnerable to a packfile parsing exploit | |
Weaknesses | CWE-115 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-30T20:01:16.338Z
Updated: 2025-07-30T20:19:21.613Z
Reserved: 2025-07-25T16:19:16.093Z
Link: CVE-2025-54584

Updated: 2025-07-30T20:19:11.836Z

Status : Analyzed
Published: 2025-07-30T20:15:38.357
Modified: 2025-08-01T20:04:28.420
Link: CVE-2025-54584

No data.