Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-39320

Опубликовано: 08 сент. 2023
Источник: debian
EPSS Низкий

Описание

The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-1.21fixed1.21.1-1package

Примечания

  • https://go.dev/issue/62198

  • https://github.com/golang/go/commit/d25a935574efd573668d8ce9ea4cfc530bb63ecb (go1.21.1)

  • https://groups.google.com/g/golang-announce/c/Fm51GRLNRvM

EPSS

Процентиль: 74%
0.00798
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 2 лет назад

The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software.

CVSS3: 8.8
redhat
больше 2 лет назад

The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software.

CVSS3: 9.8
nvd
больше 2 лет назад

The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software.

CVSS3: 9.8
github
больше 2 лет назад

The go.mod toolchain directive, introduced in Go 1.21, can be leveraged to execute scripts and binaries relative to the root of the module when the "go" command was executed within the module. This applies to modules downloaded using the "go" command from the module proxy, as well as modules downloaded directly using VCS software.

CVSS3: 9.8
fstec
больше 2 лет назад

Уязвимость файла go.mod языка программирования Go, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

EPSS

Процентиль: 74%
0.00798
Низкий