PT-2024-13749 · Go-Git +1 · Go-Git +1
Bdilalu
+1
·
Published
2024-01-10
·
Updated
2025-04-09
·
CVE-2023-49569
9.8
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
go-git versions prior to v5.11
Description:
A path traversal vulnerability was discovered in go-git, allowing an attacker to create and amend files across the filesystem. In the worst-case scenario, remote code execution could be achieved. Applications are only affected if they are using the ChrootOS, which is the default when using "Plain" versions of Open and Clone functions. Applications using BoundOS or in-memory filesystems are not affected by this issue. This is a go-git implementation issue and does not affect the upstream git cli.
Recommendations:
For versions prior to v5.11, upgrade to v5.11 to mitigate this vulnerability.
As a temporary workaround, consider limiting the use of go-git to only trustworthy Git servers.
Restrict access to the ChrootOS to minimize the risk of exploitation.
Avoid using the "Plain" versions of Open and Clone functions until the issue is resolved.
Fix
RCE
Path traversal
Weakness Enumeration
Related Identifiers
Affected Products
References · 17
- https://github.com/go-git/go-git/security/advisories/GHSA-449p-3h89-pw88⭐ 6025 🔗 747 · Vendor Advisory
- https://osv.dev/vulnerability/UBUNTU-CVE-2023-49569 · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-449p-3h89-pw88 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49569 · Security Note
- https://security-tracker.debian.org/tracker/source-package/golang-github-go-git-go-git · Vendor Advisory
- https://cve.org/CVERecord?id=CVE-2023-49569 · Security Note
- https://security-tracker.debian.org/tracker/CVE-2023-49569 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2023-49569 · Vendor Advisory
- https://osv.dev/vulnerability/GO-2024-2456 · Vendor Advisory
- https://ubuntu.com/security/CVE-2023-49569 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-49569 · Security Note
- https://github.com/go-git/go-git⭐ 6134 🔗 757 · Note
- https://twitter.com/syedaquib77/status/1909922196987981925 · Twitter Post
- https://twitter.com/CVEnew/status/1745761346917220615 · Twitter Post
- https://twitter.com/VulmonFeeds/status/1745802938860150966 · Twitter Post