Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making "go env" print them out.
History

Fri, 28 Mar 2025 15:45:00 +0000

Type Values Removed Values Added
References

Fri, 28 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Gotoolchain
Gotoolchain cmd\/go
CPEs cpe:2.3:a:gotoolchain:cmd\/go:*:*:*:*:*:*:*:*
Vendors & Products Gotoolchain
Gotoolchain cmd\/go
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 21 Aug 2024 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2025-03-28T15:02:59.076Z

Reserved: 2023-01-25T21:19:20.641Z

Link: CVE-2023-24531

cve-icon Vulnrichment

Updated: 2025-03-28T15:02:59.076Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-02T20:15:05.270

Modified: 2025-03-28T15:15:43.630

Link: CVE-2023-24531

cve-icon Redhat

No data.