Vulnerability Description
go-getter up to 1.5.11 and 2.0.2 allowed arbitrary host access via go-getter path traversal, symlink processing, and command injection flaws. Fixed in 1.6.1 and 2.1.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hashicorp | Go-Getter | <= 1.5.11 |
Related Weaknesses (CWE)
References
- https://discuss.hashicorp.comVendor Advisory
- https://discuss.hashicorp.com/t/hcsec-2022-13-multiple-vulnerabilities-in-go-getVendor Advisory
- https://github.com/hashicorp/go-getter/releasesRelease NotesThird Party Advisory
- https://discuss.hashicorp.comVendor Advisory
- https://discuss.hashicorp.com/t/hcsec-2022-13-multiple-vulnerabilities-in-go-getVendor Advisory
- https://github.com/hashicorp/go-getter/releasesRelease NotesThird Party Advisory
FAQ
What is CVE-2022-30321?
CVE-2022-30321 is a vulnerability with a CVSS score of 8.6 (HIGH). go-getter up to 1.5.11 and 2.0.2 allowed arbitrary host access via go-getter path traversal, symlink processing, and command injection flaws. Fixed in 1.6.1 and 2.1.0.
How severe is CVE-2022-30321?
CVE-2022-30321 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-30321?
Check the references section above for vendor advisories and patch information. Affected products include: Hashicorp Go-Getter.