In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both '{' and '}' characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Moduleawarego_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "15.0-NA"
}
]
},
{
"cpe": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "9.0"
}
]
},
{
"cpe": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "15.0"
}
]
},
{
"cpe": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "15.1"
}
]
},
{
"cpe": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "42.3"
}
]
},
{
"cpe": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "12-NA"
}
]
}
]
}{
"cpe": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "1.10.6"
},
{
"introduced": "1.11.0"
},
{
"fixed": "1.11.3"
}
]
}