CVE-2018-16873

Published: Dic 14, 2018 Last Modified: Nov 21, 2024
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,5
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: required
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
MEDIUM 6,8
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: partial
Integrity: partial
Availability: partial

Description

AI Translation Available

In Go before 1.10.6 and 1.11.x before 1.11.3, the 'go get' command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains, it's possible to arrange things so that a Git repository is cloned to a folder named '.git' by using a vanity import path that ends with '/.git'. If the Git repository root contains a 'HEAD' file, a 'config' file, an 'objects' directory, a 'refs' directory, with some work to ensure the proper ordering of operations, 'go get -u' can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the 'config' file in the original Git repository root for its configuration, and if that config file contains malicious commands, they will execute on the system running 'go get -u'.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,6061
Percentile
1,0th
Updated

EPSS Score Trend (Last 91 Days)

20

Improper Input Validation

Stable
Common Consequences
Security Scopes Affected:
Availability Confidentiality Integrity
Potential Impacts:
Dos: Crash, Exit, Or Restart Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory) Read Memory Read Files Or Directories Modify Memory Execute Unauthorized Code Or Commands
Applicable Platforms
All platforms may be affected
View CWE Details
Operating System

Linux Enterprise Server by Suse

cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Go by Golang

Version Range Affected
To 1.10.6 (exclusive)
cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Leap by Opensuse

cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Go by Golang

Version Range Affected
From 1.11.0 (inclusive)
To 1.11.3 (exclusive)
cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Leap by Opensuse

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Backports Sle by Opensuse

cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Leap by Opensuse

cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16873
https://groups.google.com/forum/?pli=1#%21topic/golang-announce/Kw31K8G7Fi0
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://security.gentoo.org/glsa/201812-09
Mitigation Third Party Advisory
https://security.gentoo.org/glsa/201812-09
http://www.securityfocus.com/bid/106226
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/106226
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16873
https://groups.google.com/forum/?pli=1#%21topic/golang-announce/Kw31K8G7Fi0
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://security.gentoo.org/glsa/201812-09
Mitigation Third Party Advisory
https://security.gentoo.org/glsa/201812-09
http://www.securityfocus.com/bid/106226
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/106226