CVE-2023-24531

July 2, 2024, 8:15 p.m.

Received
CVE has been recently published to the CVE List and has been received by the NVD.

Products

Go programming language

Source

security@golang.org

Tags

CVE-2023-24531 details

Published : July 2, 2024, 8:15 p.m.
Last Modified : July 2, 2024, 8:15 p.m.

Description

Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making "go env" print them out.

CVSS Score

1 2 3 4 5 6 7 8 9 10

Weakness

Weakness Name Description

References

URL Source
https://go.dev/cl/488375 security@golang.org
https://go.dev/cl/493535 security@golang.org
https://go.dev/issue/58508 security@golang.org
https://groups.google.com/g/golang-dev/c/ixHOFpSbajE/m/8EjlbKVWAwAJ security@golang.org
https://pkg.go.dev/vuln/GO-2024-2962 security@golang.org
This website uses the NVD API, but is not approved or certified by it.