Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWZxZmgtNzc4bS0ydjMy
GitHub CLI can execute a git binary from the current directory
Impact
GitHub CLI depends on a git.exe
executable being found in system %PATH%
on Windows. However, if a malicious .\git.exe
or .\git.bat
is found in the current working directory at the time of running gh
, the malicious command will be invoked instead of the system one.
Windows users who run gh
inside untrusted directories are affected.
Patches
Users should upgrade to GitHub CLI v1.2.1.
Workarounds
Other than avoiding untrusted repositories, there is no workaround.
References
https://github.com/golang/go/issues/38736
Permalink: https://github.com/advisories/GHSA-fqfh-778m-2v32JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWZxZmgtNzc4bS0ydjMy
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 3 years ago
Updated: almost 2 years ago
Identifiers: GHSA-fqfh-778m-2v32
References:
- https://github.com/cli/cli/security/advisories/GHSA-fqfh-778m-2v32
- https://github.com/advisories/GHSA-fqfh-778m-2v32
Blast Radius: 0.0
Affected Packages
go:github.com/cli/cli
Dependent packages: 58Dependent repositories: 36
Downloads:
Affected Version Ranges: < 1.2.1
Fixed in: 1.2.1
All affected versions: 0.4.0, 0.5.0, 0.5.1, 0.5.2, 0.5.3, 0.5.4, 0.5.5, 0.5.6, 0.5.7, 0.6.0, 0.6.1, 0.6.2, 0.6.3, 0.6.4, 0.7.0, 0.8.0, 0.9.0, 0.10.0, 0.10.1, 0.11.0, 0.11.1, 0.12.0, 1.0.0, 1.1.0, 1.2.0
All unaffected versions: 1.2.1, 1.3.0, 1.3.1, 1.4.0, 1.5.0, 1.6.0, 1.6.1, 1.6.2, 1.7.0, 1.8.0, 1.8.1, 1.9.0, 1.9.1, 1.9.2, 1.10.0, 1.10.1, 1.10.2, 1.10.3, 1.11.0, 1.12.0, 1.12.1, 1.13.0, 1.13.1, 1.14.0