Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-26284
HistoryDec 21, 2020 - 10:40 p.m.

CVE-2020-26284 Hugo can execute a binary from the current directory on Windows

2020-12-2122:40:15
CWE-78
GitHub_M
www.cve.org
1
cve-2020-26284 hugo security hugo v0.79.1 windows users

CVSS3

7.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N

AI Score

8.6

Confidence

High

EPSS

0.002

Percentile

61.3%

Hugo is a fast and Flexible Static Site Generator built in Go. Hugo depends on Go’s os/exec for certain features, e.g. for rendering of Pandoc documents if these binaries are found in the system %PATH% on Windows. In Hugo before version 0.79.1, if a malicious file with the same name (exe or bat) is found in the current working directory at the time of running hugo, the malicious command will be invoked instead of the system one. Windows users who run hugo inside untrusted Hugo sites are affected. Users should upgrade to Hugo v0.79.1. Other than avoiding untrusted Hugo sites, there is no workaround.

CNA Affected

[
  {
    "product": "hugo",
    "vendor": "gohugoio",
    "versions": [
      {
        "status": "affected",
        "version": "< 0.79.1"
      }
    ]
  }
]

CVSS3

7.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N

AI Score

8.6

Confidence

High

EPSS

0.002

Percentile

61.3%