420
VMScore

CVE-2018-6574

Published: 07/02/2018 Updated: 07/11/2023
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 420
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Go prior to 1.8.7, Go 1.9.x prior to 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow "go get" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

golang go 1.9

golang go 1.10

golang go 1.9.1

golang go 1.9.2

golang go 1.9.3

golang go

debian debian linux 9.0

redhat enterprise linux server 7.0

redhat enterprise linux server tus 7.6

redhat enterprise linux server eus 7.6

redhat enterprise linux server aus 7.6

Vendor Advisories

Synopsis Moderate: golang security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for golang is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring Syst ...
Synopsis Moderate: go-toolset-7 and go-toolset-7-golang security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for go-toolset-7 and go-toolset-7-golang is now available for Red Hat Developer ToolsRed Hat Product Security has rated this update as having a security impact of Mo ...
Arbitrary code execution during "go get" via C compiler options:An arbitrary command execution flaw was found in the way Go's "go get" command handled gcc and clang sensitive options during the build A remote attacker capable of hosting malicious repositories could potentially use this flaw to cause arbitrary command execution on the client side ...
Arbitrary code execution during go get or go get -dGo before 184 and 19x before 191 allows "go get" remote command execution Using custom domains, it is possible to arrange things so that examplecom/pkg1 points to a Subversion repository but examplecom/pkg1/pkg2 points to a Git repository If the Subversion repository includes a Git checko ...
An arbitrary command execution flaw was found in the way Go's "go get" command handled gcc and clang sensitive options during the build A remote attacker capable of hosting malicious repositories could potentially use this flaw to cause arbitrary command execution on the client side ...
Go before 187, Go 19x before 194, and Go 110 pre-releases before Go 110rc2 allow "go get" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked ...

Github Repositories

Pentesterlabs

cve-2018-6574 gcc -shared -o attackso -fPIC attackc

A simple POC for CVE-2018-6574

CVE-2018-6574 POC LINK A simple POC for CVE-2018-6574 nvdnistgov/vuln/detail/CVE-2018-6574 blognsfocusnet/cve-2018-6574/

POC-CVE-2018-6574 Just playing with this vulnerability on a target 😅

CVE-2018-6574 go get

CVE-2018-6574 CVE-2018-6574 go get

pentesterlab test payload

cve-2018-6574-payload

Vulnerble-code

CVE-2018-6574 Vulnerble-code PoC para explotar CVE-2018-6574 en Pentesterlab!!

CVE-2018-6574 this vulnerability impacts Golang go get command and allows an attacker to gain code execution on a system by installing a malicious library, this vulnerability was fixed in Go 1.8. 7, 1.9. 4 and 1.10rc2. Golang will build native extensions.

cve-2018-6574-exploit gcc -shared -o attackso -fPIC attackc go get githubcom/zerbaliy3v/cve-2018-6574-exploit

CVE-2018-6574-go-get-RCE The issue is due to the fact that when installing a package, Golang will build native extensions This can be used to pass additional flags to the compiler to gain code execution For example, CFLAGS can be used You can build it using the following command: $ gcc -shared -o attackso -fPIC attackc Once you host your full payload on Github, you should

This repository holds a PoC of the CVE-2018-6574 "go get RCE", that allowed to execute commands when downloading a 3rd party package This could be done, as the cflags allowed to set an external library In this PoC, the external library executes a command on the constructor

CVE-2018-6574 POC 相关链接 nvdnistgov/vuln/detail/CVE-2018-6574 blognsfocusnet/cve-2018-6574/ githubcom/neargle/CVE-2018-6574-POC 运行 go get githubcom/hitwhfanke/CNNVD-201802-203 使用说明 payload 在: githubcom/hitwhfanke/CNNVD-201802-203/blob/master/calcc#L10 现在已经用 CGO 的特

CVE-2018-6574: go get RCE solution for pentesterlab challenge

CVE-2018-6574-Solution gcc -shared -o attackso -fPIC attackc

demo CVE-2018-6574 Go Exploit via GithubThis vulnerability impacts Golang go get command and allows an attacker to gain code execution on a system installing his malicious library This is a good example of a vulnerability that can be exploited using typosquatting to gain code execution on developers' workstations and production systems This vulnerability was fixed in

CVE-2018-6574 POC Exploit POC For CVE-2018-6574 Compile Create an exploit file with the following: #include<stdioh> #include<stdlibh> static void malicious() __attribute__((constructor)); void malicious() { system("COMMAND"); } Compile it: gcc -shared -o exploitso -fPIC exploitc

Remote command execution in Golang go get command allows an attacker to gain code execution on a system by installing a malicious library.

CVE-2018-6574 Remote command execution in Golang go get command CVE-2018-6574 this vulnerability impacts Golang go get command and allows an attacker to gain code execution on a system by installing a malicious library, this vulnerability was fixed in Go 187, 194 and 110rc2 Golang will build native extensions This can be used to pass additional flags to the compiler to

A red team emulation tool deveoped by CyCraft Technology

gdoor Gdoor is a macOS red team emulation tool developed by CyCraft Technology It provides a control panel to perform attacks on every client connected to it It can perform advanced persistence threats with other initial access techniques such as CVE-2018-6574 which we used to demo in our presentation We utilized it to construct a macOS cyber range to evaluate the blue team

TESTING

CVE-2018-6574 TESTING

CVE-2018-6574 Remote command execution in Golang go get command CVE-2018-6574 this vulnerability impacts Golang go get command and allows an attacker to gain code execution on a system by installing a malicious library, this vulnerability was fixed in Go 187, 194 and 110rc2 Golang will build native extensions This can be used to pass additional flags to the compiler to

CVE-2018-6574 go get RCE

CVE-2018-6574 CVE-2018-6574 go get RCE

cve-2018-6574

cve-2018-6574 $ gcc -shared -o attackso -fPIC attackc

cve-2018-6574

cve-2018-6574 $ gcc -shared -o attackso -fPIC attackc

The issue is due to the fact that when installing a package, Golang will build native extensions. This can be used to pass additional flags to the compiler to gain code execution. For example, CFLAGS can be used.

CVE-2018-6574-go-get-RCE The issue is due to the fact that when installing a package, Golang will build native extensions This can be used to pass additional flags to the compiler to gain code execution For example, CFLAGS can be used You can build it using the following command: $ gcc -shared -o attackso -fPIC attackc Once you host your full payload on Github, you should

CVE-2018-6574 Remote command execution in Golang go get command CVE-2018-6574 this vulnerability impacts Golang go get command and allows an attacker to gain code execution on a system by installing a malicious library, this vulnerability was fixed in Go 187, 194 and 110rc2 Golang will build native extensions This can be used to pass additional flags to the compiler to

CVE-2018-6574 Go before 187, Go 19x before 194, and Go 110 pre-releases before Go 110rc2 allow go get remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked (from mitre) RCE command The command was compiled into the dynamic library calc_darwinso And the current comman

Exploit for remote command execution in Golang go get command.

CVE-2018-6574 Exploit for remote command execution in Golang go get command Introduction When you go get a package, Go is designed to build and install the package without running any code from it The intent is that you can safely get, build, and even install Go packages without trusting them at all In theory, it seems like this should be a simple feat for the Go toolchain,

一些关于go代码安全漏洞的整理

持续更新!!! sql注入 sql注入 ssrf ssrf xml注入 xml注入 xss xss 代码注入 代码注入(cve-2018-6574) 命令执行 命令执行 文件上传 文件上传 gitea条件竞争,任意文件写入 文件读取_下载 文件读取_下载 gitea路径穿越漏洞 grafana任意文件读取 未授权访问 Gitea140未授权访问 CVE-2021-45232-Apache-APISIX-Dashboa

CVE-2018-6574

CVE-2018-6574-Solution

CVE-2018-6574

CVE-2018-6574-Solution

CVE-2018-6574

go-get-rce CVE-2018-6574

CVE-2018-6574 POC : golang 'go get' remote command execution during source code build

CVE-2018-6574 POC LINK nvdnistgov/vuln/detail/CVE-2018-6574 blognsfocusnet/cve-2018-6574/ RUN go get githubcom/neargle/CVE-2018-6574-POC DETAIL payload 在: githubcom/neargle/CVE-2018-6574-POC/blob/master/calcc#L10 现在已经用 CGO 的特性支持了全平台,linux go get 之后会新建一个 /tmp/go-r