First published: Tue May 24 2022(Updated: )
go-getter up to 1.5.11 and 2.0.2 allowed arbitrary host access via go-getter path traversal, symlink processing, and command injection flaws. Fixed in 1.6.1 and 2.1.0.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp go-getter | <=1.5.11 | |
HashiCorp go-getter | =2.0.2 | |
redhat/github.com/hashicorp/go-getter | <1.6.1 | 1.6.1 |
redhat/github.com/hashicorp/go-getter | <2.1.0 | 2.1.0 |
The fix includes new configuration options to help limit the security exposure and have more secure defaults.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-30321 is a vulnerability in the go-getter library that allows arbitrary host access via go-getter path traversal symlink.
The severity level of CVE-2022-30321 is high with a score of 8.6.
CVE-2022-30321 may lead to a denial of service by allowing attackers to bypass certain configuration settings.
Versions up to and including 1.5.11 and version 2.0.2 of go-getter are affected by CVE-2022-30321.
To fix CVE-2022-30321, upgrade to version 1.6.1 for versions up to 1.5.11, or upgrade to version 2.1.0 for version 2.0.2.