Lucene search

K
prionPRIOn knowledge basePRION:CVE-2022-41716
HistoryNov 02, 2022 - 4:15 p.m.

Code injection

2022-11-0216:15:00
PRIOn knowledge base
www.prio-n.com
10
code injection
windows
environment variable manipulation
nul values
attackers
startprocess
os/exec.cmd

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.1%

Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string โ€œA=B\x00C=Dโ€ sets the variables โ€œA=Bโ€ and โ€œC=Dโ€.

CPENameOperatorVersion
golt1.18.8
goge1.19.0
golt1.19.3

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.1%