Lucene search

K
osvGoogleOSV:BIT-GOLANG-2023-29404
HistoryMar 06, 2024 - 10:55 a.m.

BIT-golang-2023-29404

2024-03-0610:55:27
Google
osv.dev
13
go command
cgo
build time
malicious module
untrusted code
linker flags
ldflags directive
sanitization
gc compiler
gccgo compiler

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

77.3%

The go command may execute arbitrary code at build time when using cgo. This may occur when running โ€œgo getโ€ on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a โ€œ#cgo LDFLAGSโ€ directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.

CPENameOperatorVersion
golangge1.20.0
golanglt1.19.10
golanglt1.20.5

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

77.3%