Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-24531

Опубликовано: 02 июл. 2024
Источник: debian
EPSS Низкий

Описание

Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making "go env" print them out.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-1.21not-affectedpackage
golang-1.19removedpackage
golang-1.19no-dsabookwormpackage
golang-1.15removedpackage
golang-1.15no-dsabullseyepackage

Примечания

  • https://github.com/golang/go/issues/58508

  • https://github.com/golang/go/commit/f379e78951a405e7e99a60fb231eeedbf976c108 (go1.21rc1)

  • https://github.com/golang/go/commit/05cc9e55876874462a4726ca0101c970838c80e5 (go1.21rc1)

EPSS

Процентиль: 57%
0.00354
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 1 года назад

Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making "go env" print them out.

CVSS3: 9.8
nvd
около 1 года назад

Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making "go env" print them out.

CVSS3: 9.8
msrc
10 дней назад

Output of "go env" does not sanitize values in cmd/go

CVSS3: 5.3
redos
11 месяцев назад

Уязвимость golang

CVSS3: 9.8
github
около 1 года назад

Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making "go env" print them out.

EPSS

Процентиль: 57%
0.00354
Низкий