
Then scroll down to find virtualapp/didlogical under Generic Credentials category. Step 2: Select Windows Credentials directory. As a workaround, users should avoid recursively cloning untrusted repositories with the -recurse-submodules option. Step 1: Navigate to Control Panel > User Accounts > Credential Manager. GCM Core 2.0.289 is also bundled in the latest Git for Windows release version 2.29.2(3). GCM Core version 2.0.289 contains the fix for this vulnerability, and is available from the project's GitHub releases page. The Git Credential Manager for Windows (GCM) provides secure Git credential storage for Windows. in credential manager, at the top are two options 'web Credentials' and Windows credentials' you can only view the passwords in Web credentials.

This only affects GCM Core on Windows, not macOS or Linux-based distributions. Andrea Warner - Technical Program Manager - Microsoft LinkedIn Andrea Warner Business Program Manager at Microsoft Greater Seattle Area 508 followers 500+ connections Join to view profile. If a malicious git.exe executable is present in the top-level repository then this binary will be started by Git Credential Manager Core when attempting to read configuration, and not git.exe as found on the %PATH%. In Git Credential Manager Core before version 2.0.289, when recursively cloning a Git repository on Windows with submodules, Git will first clone the top-level repository and then recursively clone all submodules by starting new Git processes from the top-level working directory. Git Credential Manager Core (GCM Core) is a secure Git credential helper built on.
