<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Copilot CLI (&lt;= 1.0.42) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/copilot-cli--1.0.42/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 16:17:45 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/copilot-cli--1.0.42/feed.xml" rel="self" type="application/rss+xml"/><item><title>GitHub Copilot CLI: Nested Bare Repository RCE via Git Configuration</title><link>https://feed.craftedsignal.io/briefs/2026-05-github-copilot-cli-rce/</link><pubDate>Mon, 11 May 2026 16:17:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-github-copilot-cli-rce/</guid><description>GitHub Copilot CLI versions prior to 1.0.43 are vulnerable to arbitrary code execution via a malicious bare git repository nested within a project directory, exploiting git's automatic bare repository discovery and the `core.fsmonitor` configuration setting.</description><content:encoded><![CDATA[<p>A security vulnerability exists in GitHub Copilot CLI versions prior to 1.0.43 that allows for arbitrary code execution. The vulnerability stems from how Git handles bare repositories nested within a project directory. An attacker can create a malicious bare Git repository with a specially crafted configuration. When GitHub Copilot CLI performs Git operations, it may inadvertently discover and read the configuration of the malicious bare repository, leading to the execution of arbitrary commands defined within settings like <code>core.fsmonitor</code>. This poses a significant risk, as the execution occurs without user consent or awareness. This vulnerability was addressed in version 1.0.43 by setting <code>safe.bareRepository=explicit</code> through environment variables.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious bare Git repository.</li>
<li>The attacker nests the malicious repository within a project directory (e.g., <code>vendor/malicious.git/</code>).</li>
<li>The attacker configures the <code>core.fsmonitor</code> setting within the malicious bare repository to execute arbitrary commands. Other settings like <code>core.hookspath</code>, <code>diff.external</code>, and <code>merge.tool</code> could also be targeted.</li>
<li>A user clones or otherwise acquires the project containing the malicious repository. This could occur through a pull request, dependency, or other means.</li>
<li>GitHub Copilot CLI performs a Git operation (e.g., <code>git status</code>, <code>git diff</code>, <code>git rev-parse</code>) that traverses into or through the directory containing the malicious bare repository.</li>
<li>Git automatically discovers the bare repository during directory traversal.</li>
<li>Git reads the configuration of the discovered bare repository, including the attacker-controlled <code>core.fsmonitor</code> setting.</li>
<li>The attacker&rsquo;s arbitrary command is executed on the user&rsquo;s system, leading to potential data exfiltration, credential theft, file modification, or further system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to achieve arbitrary code execution on a user&rsquo;s workstation whenever GitHub Copilot CLI performs Git operations near the malicious directory. This could lead to data exfiltration, credential theft, file modification, or further system compromise. The vulnerable versions of GitHub Copilot CLI are those prior to 1.0.43. The vulnerability highlights the danger of trusting implicitly-configured Git repositories within a project.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade GitHub Copilot CLI to version 1.0.43 or later to incorporate the fix for CVE-2026-45033.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Git Configuration Modification&rdquo; to monitor for unauthorized changes to Git configuration settings.</li>
<li>Enable process creation logging to detect execution from unusual git configuration locations, as detected by the rule &ldquo;Detect Git Command Execution from Unusual Locations&rdquo;.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>git</category><category>rce</category><category>github</category><category>code execution</category></item></channel></rss>