First published: Fri Dec 14 2018(Updated: )
In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both '{' and '}' characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Go | <1.10.6 | |
Golang Go | >=1.11.0<1.11.3 | |
openSUSE Backports SLE | =15.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =42.3 | |
SUSE Linux Enterprise Server | =12 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16874 is a vulnerability in Go before 1.10.6 and 1.11.x before 1.11.3 that allows directory traversal.
CVE-2018-16874 affects Go versions before 1.10.6 and 1.11.x before 1.11.3.
CVE-2018-16874 has a severity rating of 8.1 (High).
CVE-2018-16874 affects Go before 1.10.6 and 1.11.x before 1.11.3.
To fix CVE-2018-16874, update to Go version 1.10.6 or higher for Go 1.10.x, and update to Go version 1.11.3 or higher for Go 1.11.x.