Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-30580

Опубликовано: 10 авг. 2022
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows execution of any binaries in the working directory named either "..com" or "..exe" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset.

A flaw was found in the os/exec golang package. This issue occurs when invoking different Cmd methods and the Cmd.Path is unset. This could lead to a command injection, allowing an attacker to execute any binaries in the working directory.

Отчет

The CVE-2022-30580 affects windows only, where empty Cmd.Path can result in running unintended binary on Windows. Packages shipped with Red Hat Enterprise Linux - 8 and 9 are unaffected.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Custom Metric Autoscaler operator for Red Hat Openshiftcustom-metrics-autoscaler/custom-metrics-autoscaler-rhel8Not affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-loki-rhel8Not affected
Migration Toolkit for Containersrhmtc/openshift-velero-plugin-rhel8Not affected
Migration Toolkit for Virtualizationmigration-toolkit-virtualization/mtv-controller-rhel9Not affected
mirror registry for Red Hat OpenShiftmirror-registry-containerNot affected
Node HealthCheck Operatorworkload-availability/node-healthcheck-rhel8-operatorNot affected
Node Maintenance Operatorworkload-availability/node-maintenance-rhel8-operatorNot affected
OpenShift API for Data Protectionoadp/oadp-velero-rhel8Not affected
OpenShift Developer Tools and ServiceshelmNot affected
OpenShift Developer Tools and Servicesocp-tools-4/jenkins-rhel8Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=2118605golang: os/exec: Code injection in Cmd.Start

EPSS

Процентиль: 4%
0.00022
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 3 года назад

Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows execution of any binaries in the working directory named either "..com" or "..exe" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset.

CVSS3: 7.8
nvd
почти 3 года назад

Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows execution of any binaries in the working directory named either "..com" or "..exe" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset.

CVSS3: 7.8
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 7.8
debian
почти 3 года назад

Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 ...

CVSS3: 7.8
github
почти 3 года назад

Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows execution of any binaries in the working directory named either "..com" or "..exe" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset.

EPSS

Процентиль: 4%
0.00022
Низкий

7.8 High

CVSS3