GO-2022-0203

Source
https://pkg.go.dev/vuln/GO-2022-0203
Import Source
https://vuln.go.dev/ID/GO-2022-0203.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2022-0203
Aliases
Published
2022-08-09T23:19:00Z
Modified
2024-05-20T16:03:47Z
Summary
Remote command execution via "go get" command with "-insecure" option in cmd/go
Details

The "go get" command is vulnerable to remote code execution.

When the -insecure command-line option is used, "go get" does not validate the import path (get/vcs.go only checks for "://" anywhere in the string), which allows remote attackers to execute arbitrary OS commands via a crafted web site.

References
Credits
    • Arthur Khashaev

Affected packages

Go / toolchain

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.5
Introduced
1.10.0-0
Fixed
1.10.1

Ecosystem specific

{
    "imports": [
        {
            "path": "cmd/go"
        }
    ]
}