Skip to content

Commit 2d77dd8

Browse files
committed
mingw: skip symlink type auto-detection for network share targets
On Windows, symbolic links come in two flavors: file symlinks and directory symlinks. Since Git was born on Linux where this distinction does not exist, Git for Windows has to auto-detect the type by looking at the target. When the target does not yet exist at symlink creation time, Git for Windows creates a "phantom" file symlink and later, once checkout is complete, calls `CreateFileW()` on the target to check whether it is actually a directory. If the symlink target is a UNC path (e.g. `\\attacker\share`), this auto-detection triggers an SMB connection to the remote host. Windows performs NTLM authentication by default for such connections, which means a crafted repository can exfiltrate the cloning user's NTLMv2 hash to an attacker-controlled server without any user interaction beyond `git clone -c core.symlinks=true <url>`. There are ways to specify UNC paths that start with only a single backslash (e.g. `\??\UNC\host\share`); All of them do start like that, though, so let's use that as a tell-tale that we should skip the auto-detection in `process_phantom_symlink()`. The symlink is then left as a file symlink (the `mklink` default), and a warning is emitted suggesting the user set the `symlink` gitattribute to `dir` if a directory symlink is needed. When the attribute is already set, auto-detection is never invoked in the first place, so that code path is unaffected. This is the same class of vulnerability as CVE-2025-66413 (GHSA-hv9c-4jm9-jh3x) and follows the same general mitigation pattern that MinTTY adopted for ANSI escape sequences referencing network share paths (GHSA-jf4m-m6rv-p6c5). Note that there are legitimate paths starting with a single backslash that are _not_ network paths: drive-less absolute paths are interpreted as relative to the current working directory's drive. In practice, these are highly uncommon (and brittle, just one working directory change away from breaking). In any case, the only consequence is now that the symlink type of those has to be specified via Git attributes, is all. Reported-by: Justin Lee <jessdhoctor@gmail.com> Addresses: CVE-2026-32631 Addresses: GHSA-9j5h-h4m7-85hx Assisted-by: Claude Opus 4.6 Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
1 parent 1751905 commit 2d77dd8

1 file changed

Lines changed: 23 additions & 0 deletions

File tree

compat/mingw.c

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -385,6 +385,29 @@ process_phantom_symlink(const wchar_t *wtarget, const wchar_t *wlink)
385385
wchar_t relative[MAX_LONG_PATH];
386386
const wchar_t *rel;
387387

388+
/*
389+
* Do not follow symlinks to network shares, to avoid NTLM credential
390+
* leak from crafted repositories (e.g. \\attacker-server\share).
391+
* Since paths come in all kind of enterprising shapes and forms (in
392+
* addition to the canonical `\\host\share` form, there's also
393+
* `\??\UNC\host\share`, `\GLOBAL??\UNC\host\share` and also
394+
* `\Device\Mup\host\share`, just to name a few), we simply avoid
395+
* following every symlink target that starts with a slash.
396+
*
397+
* This also catches drive-less absolute paths, of course. These are
398+
* uncommon in practice (and also fragile because they are relative to
399+
* the current working directory's drive). The only "harm" this does
400+
* is that it now requires users to specify via the Git attributes if
401+
* they have such an uncommon symbolic link and need it to be a
402+
* directory type link.
403+
*/
404+
if (is_wdir_sep(wtarget[0])) {
405+
warning("created file symlink '%ls' pointing to '%ls';\n"
406+
"set the `symlink` gitattribute to `dir` if a "
407+
"directory symlink is required", wlink, wtarget);
408+
return PHANTOM_SYMLINK_DONE;
409+
}
410+
388411
/* check that wlink is still a file symlink */
389412
if ((GetFileAttributesW(wlink)
390413
& (FILE_ATTRIBUTE_REPARSE_POINT | FILE_ATTRIBUTE_DIRECTORY))

0 commit comments

Comments
 (0)