Critical severityNVD Advisory· Published Jan 6, 2025· Updated Jan 6, 2025
go-git has an Argument Injection via the URL field
CVE-2025-21613
Description
go-git is a highly extensible git implementation library written in pure Go. An argument injection vulnerability was discovered in go-git versions prior to v5.13. Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags. This only happens when the file transport protocol is being used, as that is the only protocol that shells out to git binaries. This vulnerability is fixed in 5.13.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
gopkg.in/src-d/go-git.v4Go | >= 4.0.0, <= 4.13.1 | — |
github.com/go-git/go-git/v5Go | < 5.13.0 | 5.13.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-v725-9546-7q7mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-21613ghsaADVISORY
- github.com/go-git/go-git/security/advisories/GHSA-v725-9546-7q7mghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.