CVE-2020-26284 – github.com/gohugoio/hugo
Package
Manager: go
Name: github.com/gohugoio/hugo
Vulnerable Version: >=0 <0.79.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.0041 pctl0.6055
Details
Hugo can execute a binary from the current directory on Windows ## Impact Hugo depends on Go's `os/exec` for certain features, e.g. for rendering of Pandoc documents if these binaries are found in the system `%PATH%` on Windows. However, if a malicious file with the same name (`exe` or `bat`) is found in the current working directory at the time of running `hugo`, the malicious command will be invoked instead of the system one. Windows users who run `hugo` inside untrusted Hugo sites are affected. ## Patches Users should upgrade to Hugo v0.79.1.
Metadata
Created: 2021-06-23T17:28:26Z
Modified: 2021-05-21T18:15:45Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-8j34-9876-pvfq/GHSA-8j34-9876-pvfq.json
CWE IDs: ["CWE-78"]
Alternative ID: GHSA-8j34-9876-pvfq
Finding: F004
Auto approve: 1