Information Exposure Affecting github.com/cli/cli/v2/pkg/cmd/pr/checkout package, versions <2.63.0


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMCLICLIV2PKGCMDPRCHECKOUT-8442242
  • published28 Nov 2024
  • disclosed27 Nov 2024
  • creditRy0taK

Introduced: 27 Nov 2024

NewCVE-2024-53858  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade github.com/cli/cli/v2/pkg/cmd/pr/checkout to version 2.63.0 or higher.

Overview

github.com/cli/cli/v2/pkg/cmd/pr/checkout is a GitHub on the command line. It brings pull requests, issues, and other GitHub concepts to the terminal next to where you are already working with git and your code.

Affected versions of this package are vulnerable to Information Exposure when cloning repositories with Git submodules hosted outside of GitHub.com and ghe.com, authentication tokens may be exposed. This occurs because certain gh commands, including gh repo clone, gh repo fork and gh pr checkout invoke git to retrieve authentication tokens using the credential.helper configuration variable for any host encountered.

CVSS Scores

version 4.0
version 3.1