Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-16873
HistoryDec 14, 2018 - 12:00 a.m.

CVE-2018-16873

2018-12-1400:00:00
ubuntu.com
ubuntu.com
11

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.413 Medium

EPSS

Percentile

97.3%

In Go before 1.10.6 and 1.11.x before 1.11.3, the “go get” command is
vulnerable to remote code execution when executed with the -u flag and the
import path of a malicious Go package, or a package that imports it
directly or indirectly. Specifically, it is only vulnerable in GOPATH mode,
but not in module mode (the distinction is documented at
https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains,
it’s possible to arrange things so that a Git repository is cloned to a
folder named “.git” by using a vanity import path that ends with “/.git”.
If the Git repository root contains a “HEAD” file, a “config” file, an
“objects” directory, a “refs” directory, with some work to ensure the
proper ordering of operations, “go get -u” can be tricked into considering
the parent directory as a repository root, and running Git commands on it.
That will use the “config” file in the original Git repository root for its
configuration, and if that config file contains malicious commands, they
will execute on the system running “go get -u”.

Bugs

Notes

Author Note
mdeslaur Packages built using golang need to be rebuilt once the vulnerability has been fixed. This CVE entry does not list packages that need rebuilding outside of the main repository or the Ubuntu variants with PPA overlays.

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.413 Medium

EPSS

Percentile

97.3%