Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-7187

Опубликовано: 16 фев. 2018
Источник: redhat
CVSS3: 7.1

Описание

The "go get" implementation in Go 1.9.4, when the -insecure command-line option is used, does not validate the import path (get/vcs.go only checks for "://" anywhere in the string), which allows remote attackers to execute arbitrary OS commands via a crafted web site.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 2golangNot affected
Red Hat Ceph Storage 3golangNot affected
Red Hat Enterprise Linux 7golangWill not fix
Red Hat Enterprise Linux 8golangNot affected
Red Hat OpenShift Enterprise 3golangAffected
Red Hat OpenStack Platform 8 (Liberty) Operational ToolsgolangWill not fix
Red Hat OpenStack Platform 9 (Mitaka) Operational ToolsgolangWill not fix
Red Hat Storage 3golangNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1546386golang: arbitrary command execution via VCS path

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 8 лет назад

The "go get" implementation in Go 1.9.4, when the -insecure command-line option is used, does not validate the import path (get/vcs.go only checks for "://" anywhere in the string), which allows remote attackers to execute arbitrary OS commands via a crafted web site.

CVSS3: 8.8
nvd
почти 8 лет назад

The "go get" implementation in Go 1.9.4, when the -insecure command-line option is used, does not validate the import path (get/vcs.go only checks for "://" anywhere in the string), which allows remote attackers to execute arbitrary OS commands via a crafted web site.

CVSS3: 8.8
debian
почти 8 лет назад

The "go get" implementation in Go 1.9.4, when the -insecure command-li ...

suse-cvrf
больше 7 лет назад

Security update for go1.9

suse-cvrf
больше 7 лет назад

Security update for go1.9

7.1 High

CVSS3