ghsa-v725-9546-7q7m
Vulnerability from github
Published
2025-01-06 16:16
Modified
2025-01-06 18:43
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.2 (Critical) - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/U:Clear
9.2 (Critical) - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/U:Clear
Summary
go-git has an Argument Injection via the URL field
Details
Impact
An argument injection vulnerability was discovered in go-git
versions prior to v5.13
.
Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags. This only happens when the file
transport protocol is being used, as that is the only protocol that shells out to git
binaries.
Affected versions
Users running versions of go-git
from v4
and above are recommended to upgrade to v5.13
in order to mitigate this vulnerability.
Workarounds
In cases where a bump to the latest version of go-git
is not possible, we recommend users to enforce restrict validation rules for values passed in the URL field.
Credit
Thanks to @vin01 for responsibly disclosing this vulnerability to us.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "gopkg.in/src-d/go-git.v4" }, "ranges": [ { "events": [ { "introduced": "4.0.0" }, { "last_affected": "4.13.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/go-git/go-git/v5" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "5.13.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-21613" ], "database_specific": { "cwe_ids": [ "CWE-88" ], "github_reviewed": true, "github_reviewed_at": "2025-01-06T16:16:30Z", "nvd_published_at": "2025-01-06T17:15:47Z", "severity": "CRITICAL" }, "details": "### Impact\nAn argument injection vulnerability was discovered in `go-git` versions prior to `v5.13`. \n\nSuccessful exploitation of this vulnerability could allow an attacker to set arbitrary values to [git-upload-pack flags](https://git-scm.com/docs/git-upload-pack). This only happens when the `file` transport protocol is being used, as that is the only protocol that shells out to `git` binaries.\n\n### Affected versions\nUsers running versions of `go-git` from `v4` and above are recommended to upgrade to `v5.13` in order to mitigate this vulnerability.\n\n### Workarounds\nIn cases where a bump to the latest version of `go-git` is not possible, we recommend users to enforce restrict validation rules for values passed in the URL field.\n\n## Credit\nThanks to @vin01 for responsibly disclosing this vulnerability to us.", "id": "GHSA-v725-9546-7q7m", "modified": "2025-01-06T18:43:12Z", "published": "2025-01-06T16:16:30Z", "references": [ { "type": "WEB", "url": "https://github.com/go-git/go-git/security/advisories/GHSA-v725-9546-7q7m" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21613" }, { "type": "PACKAGE", "url": "https://github.com/go-git/go-git" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Clear", "type": "CVSS_V4" } ], "summary": "go-git has an Argument Injection via the URL field" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.