зеркало из https://github.com/golang/vulndb.git
88 строки
2.2 KiB
JSON
88 строки
2.2 KiB
JSON
{
|
|
"id": "GO-2022-1095",
|
|
"published": "0001-01-01T00:00:00Z",
|
|
"modified": "0001-01-01T00:00:00Z",
|
|
"aliases": [
|
|
"CVE-2022-41716"
|
|
],
|
|
"details": "Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows.\n\nIn syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string \"A=B\\x00C=D\" sets the variables \"A=B\" and \"C=D\".",
|
|
"affected": [
|
|
{
|
|
"package": {
|
|
"name": "stdlib",
|
|
"ecosystem": "Go"
|
|
},
|
|
"ranges": [
|
|
{
|
|
"type": "SEMVER",
|
|
"events": [
|
|
{
|
|
"introduced": "0"
|
|
},
|
|
{
|
|
"fixed": "1.18.8"
|
|
},
|
|
{
|
|
"introduced": "1.19.0"
|
|
},
|
|
{
|
|
"fixed": "1.19.3"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"database_specific": {
|
|
"url": "https://pkg.go.dev/vuln/GO-2022-1095"
|
|
},
|
|
"ecosystem_specific": {
|
|
"imports": [
|
|
{
|
|
"path": "syscall",
|
|
"goos": [
|
|
"windows"
|
|
],
|
|
"symbols": [
|
|
"StartProcess"
|
|
]
|
|
},
|
|
{
|
|
"path": "os/exec",
|
|
"goos": [
|
|
"windows"
|
|
],
|
|
"symbols": [
|
|
"Cmd.CombinedOutput",
|
|
"Cmd.Environ",
|
|
"Cmd.Output",
|
|
"Cmd.Run",
|
|
"Cmd.Start",
|
|
"Cmd.environ",
|
|
"dedupEnv",
|
|
"dedupEnvCase"
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"type": "REPORT",
|
|
"url": "https://go.dev/issue/56284"
|
|
},
|
|
{
|
|
"type": "FIX",
|
|
"url": "https://go.dev/cl/446916"
|
|
},
|
|
{
|
|
"type": "WEB",
|
|
"url": "https://groups.google.com/g/golang-announce/c/mbHY1UY3BaM/m/hSpmRzk-AgAJ"
|
|
}
|
|
],
|
|
"credits": [
|
|
{
|
|
"name": "RyotaK (https://twitter.com/ryotkak)"
|
|
}
|
|
],
|
|
"schema_version": "1.3.1"
|
|
} |