logo

GHSA-fqfh-778m-2v32 github.com/cli/cli

Package

Manager: go
Name: github.com/cli/cli
Vulnerable Version: >=0 <1.2.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

EPSS: N/A pctlN/A

Details

GitHub CLI can execute a git binary from the current directory ### Impact GitHub CLI depends on a `git.exe` executable being found in system `%PATH%` on Windows. However, if a malicious `.\git.exe` or `.\git.bat` is found in the current working directory at the time of running `gh`, the malicious command will be invoked instead of the system one. Windows users who run `gh` inside untrusted directories are affected. ### Patches Users should upgrade to GitHub CLI v1.2.1. ### Workarounds Other than avoiding untrusted repositories, there is no workaround. ### References https://github.com/golang/go/issues/38736

Metadata

Created: 2022-02-11T23:41:11Z
Modified: 2021-05-21T22:06:12Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-fqfh-778m-2v32/GHSA-fqfh-778m-2v32.json
CWE IDs: []
Alternative ID: N/A
Finding: F410
Auto approve: 1