An argument injection vulnerability was discovered in go-git versions prior to v5.13.
Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags. This only happens when the file transport protocol is being used, as that is the only protocol that shells out to git binaries.
Users running versions of go-git from v4 and above are recommended to upgrade to v5.13 in order to mitigate this vulnerability.
In cases where a bump to the latest version of go-git is not possible, we recommend users to enforce restrict validation rules for values passed in the URL field.
Thanks to @vin01 for responsibly disclosing this vulnerability to us.
{
"github_reviewed": true,
"cwe_ids": [
"CWE-88"
],
"github_reviewed_at": "2025-01-06T16:16:30Z",
"nvd_published_at": "2025-01-06T17:15:47Z",
"severity": "CRITICAL"
}