Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade go-git to > v.5.11 #431

Closed
davidsonff opened this issue Jan 11, 2024 · 3 comments
Closed

Upgrade go-git to > v.5.11 #431

davidsonff opened this issue Jan 11, 2024 · 3 comments

Comments

@davidsonff
Copy link
Contributor

go-git v4 is vulnerable to CVE-2023049569/CWE-22 - Path Traversal. Upgrading to v5.11 and above to mitigate this vulnerability.

@davidsonff
Copy link
Contributor Author

Overview
Affected versions of this package are vulnerable to Path Traversal via malicious server replies. An attacker can create and amend files across the filesystem and potentially achieve remote code execution by sending crafted responses to the client.

Notes:

This is only exploitable if the client is using ChrootOS, which is the default for certain functions such as PlainClone.

Applications using BoundOS or in-memory filesystems are not affected by this issue.

Users running versions of go-git from v4 and above are recommended to upgrade to v5.11 in order to mitigate this vulnerability.

davidsonff added a commit to davidsonff/grule-rule-engine that referenced this issue Jan 17, 2024
@davidsonff
Copy link
Contributor Author

Submitted #435

@niallnsec
Copy link
Collaborator

Thanks for the PR @davidsonff !

This issue is now fixed in release v1.15.0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants
@davidsonff @niallnsec and others