Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xfhp-jf8p-mh5w

Опубликовано: 25 июн. 2024
Источник: github
Github: Прошло ревью
CVSS3: 8.4

Описание

HashiCorp go-getter Vulnerable to Code Execution On Git Update Via Git Config Manipulation

HashiCorp’s go-getter library can be coerced into executing Git update on an existing maliciously modified Git Configuration, potentially leading to arbitrary code execution. When go-getter is performing a Git operation, go-getter will try to clone the given repository in a specified destination. Cloning initializes a git config to the provided destination and if the repository needs to get updated go-getter will pull the new changes .

An attacker may alter the Git config after the cloning step to set an arbitrary Git configuration to achieve code execution.

Пакеты

Наименование

github.com/hashicorp/go-getter

go
Затронутые версииВерсия исправления

< 1.7.5

1.7.5

EPSS

Процентиль: 28%
0.00095
Низкий

8.4 High

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 8.4
ubuntu
около 1 года назад

HashiCorp’s go-getter library can be coerced into executing Git update on an existing maliciously modified Git Configuration, potentially leading to arbitrary code execution.

CVSS3: 7.7
redhat
около 1 года назад

HashiCorp’s go-getter library can be coerced into executing Git update on an existing maliciously modified Git Configuration, potentially leading to arbitrary code execution.

CVSS3: 8.4
nvd
около 1 года назад

HashiCorp’s go-getter library can be coerced into executing Git update on an existing maliciously modified Git Configuration, potentially leading to arbitrary code execution.

CVSS3: 8.4
msrc
11 месяцев назад

Описание отсутствует

CVSS3: 8.4
debian
около 1 года назад

HashiCorp\u2019s go-getter library can be coerced into executing Git u ...

EPSS

Процентиль: 28%
0.00095
Низкий

8.4 High

CVSS3

Дефекты

CWE-77