The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/go-git/go-git/v5
to version 5.11.0 or higher.
Affected versions of this package are vulnerable to Path Traversal via malicious server replies. An attacker can create and amend files across the filesystem and potentially achieve remote code execution by sending crafted responses to the client.
Notes:
This is only exploitable if the client is using ChrootOS
, which is the default for certain functions such as PlainClone
.
Applications using BoundOS or in-memory filesystems are not affected by this issue.
Users running versions of go-git from v4 and above are recommended to upgrade to v5.11 in order to mitigate this vulnerability.
This vulnerability can be mitigated by limiting the client's use to trustworthy Git servers.