CVE-2024-6257

HashiCorp’s go-getter library can be coerced into executing Git update on an existing maliciously modified Git Configuration, potentially leading to arbitrary code execution.
Configurations

No configuration.

History

21 Nov 2024, 09:49

Type Values Removed Values Added
Summary
  • (es) Se puede obligar a la librería de HashiCorp a ejecutar una actualización de Git en una configuración de Git existente modificada maliciosamente, lo que podría conducir a la ejecución de código arbitrario.
References () https://discuss.hashicorp.com/t/hcsec-2024-13-hashicorp-go-getter-vulnerable-to-code-execution-on-git-update-via-git-config-manipulation/68081 - () https://discuss.hashicorp.com/t/hcsec-2024-13-hashicorp-go-getter-vulnerable-to-code-execution-on-git-update-via-git-config-manipulation/68081 -

25 Jun 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-25 17:15

Updated : 2024-11-21 09:49


NVD link : CVE-2024-6257

Mitre link : CVE-2024-6257

CVE.ORG link : CVE-2024-6257


JSON object : View

Products Affected

No product.

CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')