Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fqfh-778m-2v32

Опубликовано: 11 фев. 2022
Источник: github
Github: Прошло ревью

Описание

GitHub CLI can execute a git binary from the current directory

Impact

GitHub CLI depends on a git.exe executable being found in system %PATH% on Windows. However, if a malicious .\git.exe or .\git.bat is found in the current working directory at the time of running gh, the malicious command will be invoked instead of the system one.

Windows users who run gh inside untrusted directories are affected.

Patches

Users should upgrade to GitHub CLI v1.2.1.

Workarounds

Other than avoiding untrusted repositories, there is no workaround.

References

https://github.com/golang/go/issues/38736

Пакеты

Наименование

github.com/cli/cli

go
Затронутые версииВерсия исправления

< 1.2.1

1.2.1