Bug 2294254 (CVE-2024-6257)

Summary: CVE-2024-6257 hashicorp/go-getter: Arbitrary command execution through local git config file
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: brainfor, dfreiber, drow, jburrell, lsharar, luizcosta, nweather, vkumar, zkayyali
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: go-getter 1.7.5 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2294255, 2294256, 2294257    
Bug Blocks: 2294258    

Description Pedro Sampaio 2024-06-25 19:06:54 UTC
HashiCorp’s go-getter library can be coerced into executing Git update on an existing maliciously modified Git Configuration, potentially leading to arbitrary code execution.

References:

https://discuss.hashicorp.com/t/hcsec-2024-13-hashicorp-go-getter-vulnerable-to-code-execution-on-git-update-via-git-config-manipulation/68081

Comment 1 Pedro Sampaio 2024-06-25 19:14:08 UTC
Created opentofu tracking bugs for this issue:

Affects: fedora-all [bug 2294255]


Created trivy tracking bugs for this issue:

Affects: fedora-all [bug 2294256]


Created vagrant tracking bugs for this issue:

Affects: fedora-all [bug 2294257]