Lucene search

K
freebsdFreeBSD26B1100A-5A27-11ED-ABFE-29AC76EC31B5
HistoryOct 17, 2022 - 12:00 a.m.

go -- syscall, os/exec: unsanitized NUL in environment variables

2022-10-1700:00:00
vuxml.freebsd.org
19
go
project
syscall
os/exec
environment variables
windows
startprocess
cmd
malicious
exploit

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

42.1%

The Go project reports:

syscall, os/exec: unsanitized NUL in environment
variables
On Windows, syscall.StartProcess and os/exec.Cmd did not
properly check for invalid environment variable values. A
malicious environment variable value could exploit this
behavior to set a value for a different environment
variable. For example, the environment variable string
โ€œA=B\x00C=Dโ€ set the variables โ€œA=Bโ€ and โ€œC=Dโ€.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchgo118<ย 1.18.8UNKNOWN
FreeBSDanynoarchgo119<ย 1.19.3UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.001 Low

EPSS

Percentile

42.1%