Arbitrary Code Injection Affecting go1.18-doc package, versions <1.18.3-150000.1.20.1
Threat Intelligence
EPSS
0.05% (15th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES154-GO118DOC-2863533
- published 9 Jun 2022
- disclosed 7 Jun 2022
Introduced: 7 Jun 2022
CVE-2022-30580 Open this link in a new tabHow to fix?
Upgrade SLES:15.4 go1.18-doc to version 1.18.3-150000.1.20.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream go1.18-doc package and not the go1.18-doc package as distributed by SLES.
See How to fix? for SLES:15.4 relevant fixed versions and status.
Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows execution of any binaries in the working directory named either "..com" or "..exe" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when Cmd.Path is unset.
References
- https://www.suse.com/security/cve/CVE-2022-30580.html
- https://bugzilla.suse.com/1200136
- https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
- https://go.dev/cl/403759
- https://go.googlesource.com/go/+/960ffa98ce73ef2c2060c84c7ac28d37a83f345e
- https://pkg.go.dev/vuln/GO-2022-0532
- https://go.dev/issue/52574
CVSS Scores
version 3.1