Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cm6p-qc7v-m3jw

Опубликовано: 28 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS3: 7

Описание

Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.

Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.

EPSS

Процентиль: 1%
0.00009
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
23 дня назад

[cmd/go: unexpected code execution when invoking toolchain]

CVSS3: 7
nvd
10 дней назад

Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.

CVSS3: 7
debian
10 дней назад

Downloading and building modules with malicious version strings can ca ...

suse-cvrf
16 дней назад

Security update for go1.25

suse-cvrf
16 дней назад

Security update for go1.24

EPSS

Процентиль: 1%
0.00009
Низкий

7 High

CVSS3