blob: 159e3fb1509b2b098eec6349a991d2ed48f03e35 [file] [log] [blame]
id: GO-2024-2948
modules:
- module: github.com/hashicorp/go-getter
versions:
- fixed: 1.7.5
vulnerable_at: 1.7.4
packages:
- package: github.com/hashicorp/go-getter
symbols:
- GitGetter.clone
- findRemoteDefaultBranch
derived_symbols:
- Client.ChecksumFromFile
- Client.Get
- FolderStorage.Get
- Get
- GetAny
- GetFile
- GitGetter.Get
- GitGetter.GetFile
- HttpGetter.Get
summary: Code Execution on Git update in github.com/hashicorp/go-getter
description: |-
A crafted request can execute Git update on an existing maliciously modified Git
Configuration. This can potentially lead to arbitrary code execution. When
performing a Git operation, the library will try to clone the given repository
to a specified destination. Cloning initializes a git config in the provided
destination. An attacker may alter the Git config after the cloning step to set
an arbitrary Git configuration to achieve code execution.
cves:
- CVE-2024-6257
ghsas:
- GHSA-xfhp-jf8p-mh5w
references:
- advisory: https://github.com/advisories/GHSA-xfhp-jf8p-mh5w
- fix: https://github.com/hashicorp/go-getter/commit/268c11cae8cf0d9374783e06572679796abe9ce9
- web: https://discuss.hashicorp.com/t/hcsec-2024-13-hashicorp-go-getter-vulnerable-to-code-execution-on-git-update-via-git-config-manipulation/68081
source:
id: GHSA-xfhp-jf8p-mh5w
created: 2024-06-26T13:09:53.132489-07:00
review_status: REVIEWED