• CVE-2023-24531

发布时间: 2024年8月7日

修改时间: 2024年8月7日

概要

Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making "go env" print them out.

CVSS v3 指标

NVD openEuler
Confidentiality Low
Attack Vector Local
CVSS评分 N/A 5.3
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Integrity Low
User Interaction None
Availability Low

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-3287 Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making "go env" print them out. 2024年8月7日

影响产品

产品 状态
KY3.4-5A golang Unaffected
KY3.5.2 golang Unaffected
KY3.5.3 golang Unaffected
V6 golang Unaffected