You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
HashiCorp’s go-getter library can be coerced into executing Git update on an
existing maliciously modified Git Configuration, potentially leading to
arbitrary code execution. When go-getter is performing a Git operation,
go-getter will try to clone the given repository in a specified destination.
Cloning initializes a git config to the provided destination and if the
repository needs to get updated go-getter will pull the new changes .
An attacker may alter the Git config after the cloning step to set an arbitrary
Git configuration to achieve code execution.
Advisory GHSA-xfhp-jf8p-mh5w references a vulnerability in the following Go modules:
Description:
HashiCorp’s go-getter library can be coerced into executing Git update on an
existing maliciously modified Git Configuration, potentially leading to
arbitrary code execution. When go-getter is performing a Git operation,
go-getter will try to clone the given repository in a specified destination.
Cloning initializes a git config to the provided destination and if the
repository needs to get updated go-getter will pull the new changes .
An attacker may alter the Git config after the cloning step to set an arbitrary
Git configuration to achieve code execution.
References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: