Vulnerability Description
Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow "go get" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Golang | Go | <= 1.8.6 |
| Debian | Debian Linux | 9.0 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Server Aus | 7.6 |
| Redhat | Enterprise Linux Server Eus | 7.6 |
| Redhat | Enterprise Linux Server Tus | 7.6 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2018:0878Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1304Third Party Advisory
- https://github.com/KINGSABRI/CVE-in-Ruby/tree/master/CVE-2018-6574ExploitThird Party Advisory
- https://github.com/golang/go/issues/23672Issue TrackingThird Party Advisory
- https://groups.google.com/forum/#%21topic/golang-nuts/Gbhh1NxAjMU
- https://groups.google.com/forum/#%21topic/golang-nuts/sprOaQ5m3Dk
- https://www.debian.org/security/2019/dsa-4380Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0878Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1304Third Party Advisory
- https://github.com/KINGSABRI/CVE-in-Ruby/tree/master/CVE-2018-6574ExploitThird Party Advisory
- https://github.com/golang/go/issues/23672Issue TrackingThird Party Advisory
- https://groups.google.com/forum/#%21topic/golang-nuts/Gbhh1NxAjMU
- https://groups.google.com/forum/#%21topic/golang-nuts/sprOaQ5m3Dk
- https://www.debian.org/security/2019/dsa-4380Third Party Advisory
FAQ
What is CVE-2018-6574?
CVE-2018-6574 is a vulnerability with a CVSS score of 7.8 (HIGH). Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow "go get" remote command execution during source code build, by leveraging the gcc or clang plugin feature, beca...
How severe is CVE-2018-6574?
CVE-2018-6574 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-6574?
Check the references section above for vendor advisories and patch information. Affected products include: Golang Go, Debian Debian Linux, Redhat Enterprise Linux Server, Redhat Enterprise Linux Server Aus, Redhat Enterprise Linux Server Eus.