OS Command Injection Affecting hugo package, versions <0.79.1-1


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.23% (62nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about OS Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-HUGO-1053937
  • published23 Dec 2020
  • disclosed21 Dec 2020

Introduced: 21 Dec 2020

CVE-2020-26284  (opens in a new tab)
CWE-78  (opens in a new tab)

How to fix?

Upgrade Debian:unstable hugo to version 0.79.1-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream hugo package and not the hugo package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Hugo is a fast and Flexible Static Site Generator built in Go. Hugo depends on Go's os/exec for certain features, e.g. for rendering of Pandoc documents if these binaries are found in the system %PATH% on Windows. In Hugo before version 0.79.1, if a malicious file with the same name (exe or bat) is found in the current working directory at the time of running hugo, the malicious command will be invoked instead of the system one. Windows users who run hugo inside untrusted Hugo sites are affected. Users should upgrade to Hugo v0.79.1. Other than avoiding untrusted Hugo sites, there is no workaround.

CVSS Scores

version 3.1