CVE-2018-7187

HIGH

Description

The "go get" implementation in Go 1.9.4, when the -insecure command-line option is used, does not validate the import path (get/vcs.go only checks for "://" anywhere in the string), which allows remote attackers to execute arbitrary OS commands via a crafted web site.

References

https://gist.github.com/SLAYEROWNER/b2a358f13ab267f2e9543bb9f9320ffc

https://github.com/golang/go/issues/23867

https://lists.debian.org/debian-lts-announce/2018/02/msg00029.html

https://security.gentoo.org/glsa/201804-12

https://www.debian.org/security/2019/dsa-4379

https://www.debian.org/security/2019/dsa-4380

Details

Source: MITRE

Published: 2018-02-16

Updated: 2019-02-28

Type: CWE-78

Risk Information

CVSS v2.0

Base Score: 9.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 8.6

Severity: HIGH

CVSS v3.0

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 2.8

Severity: HIGH