Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-26284

Опубликовано: 21 дек. 2020
Источник: nvd
CVSS3: 7.7
CVSS3: 8.5
CVSS2: 8.5
EPSS Низкий

Описание

Hugo is a fast and Flexible Static Site Generator built in Go. Hugo depends on Go's os/exec for certain features, e.g. for rendering of Pandoc documents if these binaries are found in the system %PATH% on Windows. In Hugo before version 0.79.1, if a malicious file with the same name (exe or bat) is found in the current working directory at the time of running hugo, the malicious command will be invoked instead of the system one. Windows users who run hugo inside untrusted Hugo sites are affected. Users should upgrade to Hugo v0.79.1. Other than avoiding untrusted Hugo sites, there is no workaround.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:gohugo:hugo:*:*:*:*:*:windows:*:*
Версия до 0.79.1 (исключая)

EPSS

Процентиль: 61%
0.0041
Низкий

7.7 High

CVSS3

8.5 High

CVSS3

8.5 High

CVSS2

Дефекты

CWE-78
CWE-78

Связанные уязвимости

CVSS3: 7.7
ubuntu
около 5 лет назад

Hugo is a fast and Flexible Static Site Generator built in Go. Hugo depends on Go's `os/exec` for certain features, e.g. for rendering of Pandoc documents if these binaries are found in the system `%PATH%` on Windows. In Hugo before version 0.79.1, if a malicious file with the same name (`exe` or `bat`) is found in the current working directory at the time of running `hugo`, the malicious command will be invoked instead of the system one. Windows users who run `hugo` inside untrusted Hugo sites are affected. Users should upgrade to Hugo v0.79.1. Other than avoiding untrusted Hugo sites, there is no workaround.

CVSS3: 7.7
debian
около 5 лет назад

Hugo is a fast and Flexible Static Site Generator built in Go. Hugo de ...

CVSS3: 7.7
github
больше 4 лет назад

Hugo can execute a binary from the current directory on Windows

EPSS

Процентиль: 61%
0.0041
Низкий

7.7 High

CVSS3

8.5 High

CVSS3

8.5 High

CVSS2

Дефекты

CWE-78
CWE-78