Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-24531

Опубликовано: 02 июл. 2024
Источник: debian
EPSS Низкий

Описание

Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making "go env" print them out.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-1.21not-affectedpackage
golang-1.19removedpackage
golang-1.19no-dsabookwormpackage
golang-1.15removedpackage
golang-1.15no-dsabullseyepackage

Примечания

  • https://github.com/golang/go/issues/58508

  • https://github.com/golang/go/commit/f379e78951a405e7e99a60fb231eeedbf976c108 (go1.21rc1)

  • https://github.com/golang/go/commit/05cc9e55876874462a4726ca0101c970838c80e5 (go1.21rc1)

EPSS

Процентиль: 70%
0.00655
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
12 месяцев назад

Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making "go env" print them out.

CVSS3: 9.8
nvd
12 месяцев назад

Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making "go env" print them out.

CVSS3: 5.3
redos
8 месяцев назад

Уязвимость golang

CVSS3: 9.8
github
12 месяцев назад

Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making "go env" print them out.

CVSS3: 9.8
fstec
почти 2 года назад

Уязвимость языка программирования Golang, связанная с непринятием мер по нейтрализации специальных элементов, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 70%
0.00655
Низкий