Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-26284
HistoryDec 21, 2020 - 12:00 a.m.

CVE-2020-26284

2020-12-2100:00:00
ubuntu.com
ubuntu.com
15
hugo
static site generator
invocation vulnerability
pandoc
windows
upgrade

CVSS2

8.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

CVSS3

8.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS

0.002

Percentile

61.3%

Hugo is a fast and Flexible Static Site Generator built in Go. Hugo depends
on Go’s os/exec for certain features, e.g. for rendering of Pandoc
documents if these binaries are found in the system %PATH% on Windows. In
Hugo before version 0.79.1, if a malicious file with the same name (exe
or bat) is found in the current working directory at the time of running
hugo, the malicious command will be invoked instead of the system one.
Windows users who run hugo inside untrusted Hugo sites are affected.
Users should upgrade to Hugo v0.79.1. Other than avoiding untrusted Hugo
sites, there is no workaround.

CVSS2

8.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:S/C:C/I:C/A:C

CVSS3

8.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS

0.002

Percentile

61.3%