CVE-2018-16874
Summary
| CVE | CVE-2018-16874 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-12-14 14:29:00 UTC |
| Updated | 2023-11-07 02:53:00 UTC |
| Description | In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both '{' and '}' characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [security-announce] openSUSE-SU-2019:1444-1: important: Security update |
SUSE |
lists.opensuse.org |
|
| [SECURITY] [DLA 2591-1] golang-1.7 security update |
MLIST |
lists.debian.org |
|
| [security-announce] openSUSE-SU-2020:0554-1: important: Security update |
SUSE |
lists.opensuse.org |
|
| Google Groups |
|
groups.google.com |
|
| [SECURITY] [DLA 2592-1] golang-1.8 security update |
MLIST |
lists.debian.org |
|
| Google Groups |
MISC |
groups.google.com |
Third Party Advisory |
| [security-announce] openSUSE-SU-2019:1079-1: important: Security update |
SUSE |
lists.opensuse.org |
Third Party Advisory |
| [security-announce] openSUSE-SU-2019:1499-1: important: Security update |
SUSE |
lists.opensuse.org |
|
| [security-announce] openSUSE-SU-2019:1506-1: important: Security update |
SUSE |
lists.opensuse.org |
|
| [security-announce] openSUSE-SU-2019:1703-1: moderate: Security update f |
SUSE |
lists.opensuse.org |
|
| 1657564 – (CVE-2018-16874) CVE-2018-16874 golang: "go get" vulnerable to directory traversal via malicious package |
CONFIRM |
bugzilla.redhat.com |
Issue Tracking, Third Party Advisory |
| Go: Multiple vulnerabilities (GLSA 201812-09) — Gentoo security |
GENTOO |
security.gentoo.org |
Mitigation, Third Party Advisory |
| Golang Go CVE-2018-16874 Directory Traversal Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 174971 SUSE Enterprise Linux Security Update for containerd, docker, runc (SUSE-SU-2021:1458-1)
- 296075 Oracle Solaris 11.4 Support Repository Update (SRU) 21.69.0 Missing (CPUAPR2020)
- 710317 Gentoo Linux Go Multiple Vulnerabilities (GLSA 201812-09)