Skip to content

Commit db6401a

Browse files
committed
data/reports: add GO-2024-2948
- data/reports/GO-2024-2948.yaml Fixes #2948 Change-Id: I2b875ed9ddeaa66f8e31cfd24732b08160f4143d Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/595255 LUCI-TryBot-Result: Go LUCI <[email protected]> Reviewed-by: Damien Neil <[email protected]>
1 parent e116d8a commit db6401a

File tree

2 files changed

+112
-0
lines changed

2 files changed

+112
-0
lines changed

data/osv/GO-2024-2948.json

+71
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2024-2948",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2024-6257",
8+
"GHSA-xfhp-jf8p-mh5w"
9+
],
10+
"summary": "Code Execution on Git update in github.com/hashicorp/go-getter",
11+
"details": "A crafted request can execute Git update on an existing maliciously modified Git Configuration. This can potentially lead to arbitrary code execution. When performing a Git operation, the library will try to clone the given repository to a specified destination. Cloning initializes a git config in the provided destination. An attacker may alter the Git config after the cloning step to set an arbitrary Git configuration to achieve code execution.",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/hashicorp/go-getter",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "1.7.5"
27+
}
28+
]
29+
}
30+
],
31+
"ecosystem_specific": {
32+
"imports": [
33+
{
34+
"path": "github.com/hashicorp/go-getter",
35+
"symbols": [
36+
"Client.ChecksumFromFile",
37+
"Client.Get",
38+
"FolderStorage.Get",
39+
"Get",
40+
"GetAny",
41+
"GetFile",
42+
"GitGetter.Get",
43+
"GitGetter.GetFile",
44+
"GitGetter.clone",
45+
"HttpGetter.Get",
46+
"findRemoteDefaultBranch"
47+
]
48+
}
49+
]
50+
}
51+
}
52+
],
53+
"references": [
54+
{
55+
"type": "ADVISORY",
56+
"url": "https://github.com/advisories/GHSA-xfhp-jf8p-mh5w"
57+
},
58+
{
59+
"type": "FIX",
60+
"url": "https://github.com/hashicorp/go-getter/commit/268c11cae8cf0d9374783e06572679796abe9ce9"
61+
},
62+
{
63+
"type": "WEB",
64+
"url": "https://discuss.hashicorp.com/t/hcsec-2024-13-hashicorp-go-getter-vulnerable-to-code-execution-on-git-update-via-git-config-manipulation/68081"
65+
}
66+
],
67+
"database_specific": {
68+
"url": "https://pkg.go.dev/vuln/GO-2024-2948",
69+
"review_status": "REVIEWED"
70+
}
71+
}

data/reports/GO-2024-2948.yaml

+41
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
id: GO-2024-2948
2+
modules:
3+
- module: github.com/hashicorp/go-getter
4+
versions:
5+
- fixed: 1.7.5
6+
vulnerable_at: 1.7.4
7+
packages:
8+
- package: github.com/hashicorp/go-getter
9+
symbols:
10+
- GitGetter.clone
11+
- findRemoteDefaultBranch
12+
derived_symbols:
13+
- Client.ChecksumFromFile
14+
- Client.Get
15+
- FolderStorage.Get
16+
- Get
17+
- GetAny
18+
- GetFile
19+
- GitGetter.Get
20+
- GitGetter.GetFile
21+
- HttpGetter.Get
22+
summary: Code Execution on Git update in github.com/hashicorp/go-getter
23+
description: |-
24+
A crafted request can execute Git update on an existing maliciously modified Git
25+
Configuration. This can potentially lead to arbitrary code execution. When
26+
performing a Git operation, the library will try to clone the given repository
27+
to a specified destination. Cloning initializes a git config in the provided
28+
destination. An attacker may alter the Git config after the cloning step to set
29+
an arbitrary Git configuration to achieve code execution.
30+
cves:
31+
- CVE-2024-6257
32+
ghsas:
33+
- GHSA-xfhp-jf8p-mh5w
34+
references:
35+
- advisory: https://github.com/advisories/GHSA-xfhp-jf8p-mh5w
36+
- fix: https://github.com/hashicorp/go-getter/commit/268c11cae8cf0d9374783e06572679796abe9ce9
37+
- web: https://discuss.hashicorp.com/t/hcsec-2024-13-hashicorp-go-getter-vulnerable-to-code-execution-on-git-update-via-git-config-manipulation/68081
38+
source:
39+
id: GHSA-xfhp-jf8p-mh5w
40+
created: 2024-06-26T13:09:53.132489-07:00
41+
review_status: REVIEWED

0 commit comments

Comments
 (0)