Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-49569
HistoryJan 12, 2024 - 11:15 a.m.

Path traversal

2024-01-1211:15:00
PRIOn knowledge base
www.prio-n.com
10
vulnerability
path traversal
go-git
version prior to v5.11
chrootos
plainclone
boundos
remote code execution
filesystem
in-memory filesystems
implementation issue
nvd

7.7 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

61.4%

A path traversal vulnerability was discovered in go-git versions prior to v5.11. This vulnerability allows an attacker to create and amend files across the filesystem. In the worse case scenario, remote code execution could be achieved.

Applications are only affected if they are using the ChrootOS https://pkg.go.dev/github.com/go-git/go-billy/v5/osfs#ChrootOS , which is the default when using “Plain” versions of Open and Clone funcs (e.g. PlainClone). Applications using BoundOS https://pkg.go.dev/github.com/go-git/go-billy/v5/osfs#BoundOS  or in-memory filesystems are not affected by this issue.
This is a go-git implementation issue and does not affect the upstream git cli.

CPENameOperatorVersion
go-gitge4.0.0
go-gitlt5.11.0

7.7 High

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

61.4%