// For flags

CVE-2018-6574

golang: arbitrary code execution during "go get" via C compiler options

Severity Score

7.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

82
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow "go get" remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked.

Go, en versiones anteriores a la 1.8.7; Go en versiones 1.9.x anteriores a la 1.9.4 y los prelanzamientos de Go 1.10 anteriores a Go 1.10rc2 permiten la ejecución remota de comandos "go get" durante la construcción del código fuente aprovechando la característica del plugin gcc o clang debido a que los argumentos -fplugin= y -plugin= no se bloquearon.

An arbitrary command execution flaw was found in the way Go's "go get" command handled gcc and clang sensitive options during the build. A remote attacker capable of hosting malicious repositories could potentially use this flaw to cause arbitrary command execution on the client side.

Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. The following packages have been upgraded to a later upstream version: go-toolset-7-golang. Go Toolset is provided as a Technology Preview. Issues addressed include a code execution vulnerability.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-02-02 CVE Reserved
  • 2018-02-07 CVE Published
  • 2018-04-02 First Exploit
  • 2024-08-05 CVE Updated
  • 2025-03-29 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (90)
URL Date SRC
https://github.com/neargle/Go-Get-RCE-CVE-2018-6574-POC 2018-04-24
https://github.com/qweraqq/CVE-2018-6574 2019-04-08
https://github.com/frozenkp/CVE-2018-6574 2022-03-16
https://github.com/darthvader-htb/CVE-2018-6574 2020-05-20
https://github.com/antunesmpedro/CVE-2018-6574 2023-01-31
https://github.com/asavior2/CVE-2018-6574 2019-10-30
https://github.com/Dannners/CVE-2018-6574-go-get-RCE 2024-05-29
https://github.com/jftierno/-CVE-2018-6574 2024-03-18
https://github.com/ItsFadinG/CVE-2018-6574 2021-10-20
https://github.com/OLAOLAOLA789/CVE-2018-6574 2021-06-15
https://github.com/markisback/CVE-2018-6574 2022-08-10
https://github.com/jahwni/CVE-2018-6574 2023-02-22
https://github.com/shadofren/CVE-2018-6574 2020-12-21
https://github.com/InfoSecJack/CVE-2018-6574 2019-09-19
https://github.com/the-valluvarsploit/CVE-2018-6574 2022-03-24
https://github.com/jeyaseelans86/CVE-2018-6574 2022-11-09
https://github.com/mux0x/CVE-2018-6574 2022-12-03
https://github.com/Zeeshan12340/CVE-2018-6574 2023-06-09
https://github.com/yavolo/CVE-2018-6574 2022-04-20
https://github.com/chaosura/CVE-2018-6574 2019-05-18
https://github.com/pswalia2u/CVE-2018-6574 2020-10-13
https://github.com/vishack/CVE-2018-6574 2020-12-30
https://github.com/noname-nohost/CVE-2018-6574 2020-12-17
https://github.com/Devang-Solanki/CVE-2018-6574 2021-10-15
https://github.com/bme2003/CVE-2018-6574 2024-06-19
https://github.com/coblax/CVE-2018-6574 2020-04-29
https://github.com/nthuong95/CVE-2018-6574 2020-03-04
https://github.com/acole76/cve-2018-6574 2018-04-02
https://github.com/wb4r/go-get-rce 2023-03-05
https://github.com/ahmetmanga/go-get-rce 2018-05-20
https://github.com/redirected/cve-2018-6574 2018-11-01
https://github.com/20matan/CVE-2018-6574-POC 2018-12-16
https://github.com/zur250/Zur-Go-GET-RCE-Solution 2018-12-25
https://github.com/mekhalleh/cve-2018-6574 2024-08-12
https://github.com/veter069/go-get-rce 2019-01-11
https://github.com/duckzsc2/CVE-2018-6574-POC 2019-01-21
https://github.com/d4rkshell/go-get-rce 2019-04-19
https://github.com/french560/ptl6574 2019-07-23
https://github.com/drset/golang 2019-11-29
https://github.com/kev-ho/cve-2018-6574-payload 2020-01-02
https://github.com/sdosis/cve-2018-6574 2020-01-06
https://github.com/No1zy/CVE-2018-6574-PoC 2020-01-18
https://github.com/AdriVillaB/CVE-2018-6574 2020-03-06
https://github.com/yitingfan/CVE-2018-6574_demo 2020-03-16
https://github.com/mhamed366/CVE-2018-6574 2020-11-05
https://github.com/Eugene24/CVE-2018-6574 2020-04-08
https://github.com/it3x55/CVE-2018-6574 2020-06-12
https://github.com/Malone5923/CVE-2018-6574-go-get-RCE 2021-06-13
https://github.com/illnino/CVE-2018-6574 2020-07-20
https://github.com/TakuCoder/CVE-2018-6574 2020-08-28
https://github.com/kawkab101/cve-2018-6574 2020-09-13
https://github.com/lsnakazone/cve-2018-6574 2020-09-27
https://github.com/jongmartinez/CVE-2018-6574-POC 2020-10-22
https://github.com/NikolaT3sla/cve-2018-6574 2020-12-22
https://github.com/PLP-Orange/cve-2018-6574-exercise 2020-12-31
https://github.com/purgedemo/CVE-2018-6574 2021-01-11
https://github.com/killtr0/POC-CVE-2018-6574 2024-08-12
https://github.com/theJuan1112/pentesterlab-cve-2018-6574 2021-03-23
https://github.com/MohamedTarekq/test-CVE-2018-6574- 2021-04-15
https://github.com/repos13579/labCVE-2018-6574 2021-06-16
https://github.com/sec000/cve-2018-6574 2021-06-19
https://github.com/jaya522/CVE-2018-6574-go-get-RCE 2021-06-20
https://github.com/noobTest1122/CVE-2018-6574 2021-06-24
https://github.com/l3ouu4n9/CVE-2018-6574-POC 2021-08-16
https://github.com/R3dAlch3mist/cve-2018-6574 2021-08-17
https://github.com/imojne/CVE-2018-6574-POC 2021-11-03
https://github.com/twseptian/cve-2018-6574 2022-03-13
https://github.com/Cypheer/exploit_CVE-2018-6574 2022-05-27
https://github.com/tjcim/cve-2018-6574 2022-06-02
https://github.com/hasharmujahid/CVE-2018-6574-go-get-RCE 2022-09-07
https://github.com/chr1sM/CVE-2018-6574 2022-11-11
https://github.com/seoqqq/CVE-2018-6574 2023-01-25
https://github.com/NsByte/CVE-2018-6574 2023-04-12
https://github.com/zerbaliy3v/cve-2018-6574-exploit 2023-12-12
https://github.com/faiqu3/cve-2018-6574 2024-04-20
https://github.com/iNoSec2/cve-2018-6574 2024-07-07
https://github.com/faqihudin13/CVE-2018-6574 2024-09-05
https://github.com/lisu60/cve-2018-6574 2024-09-09
https://github.com/Saboor-Hakimi/CVE-2018-6574 2024-09-16
https://github.com/elw0od/PentesterLab 2025-03-07
https://github.com/rootxjs/CVE-2018-6574 2022-11-09
https://github.com/KINGSABRI/CVE-in-Ruby/tree/master/CVE-2018-6574 2024-08-05
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Golang
Search vendor "Golang"
Go
Search vendor "Golang" for product "Go"
<= 1.8.6
Search vendor "Golang" for product "Go" and version " <= 1.8.6"
-
Affected
Golang
Search vendor "Golang"
Go
Search vendor "Golang" for product "Go"
1.9
Search vendor "Golang" for product "Go" and version "1.9"
-
Affected
Golang
Search vendor "Golang"
Go
Search vendor "Golang" for product "Go"
1.9.1
Search vendor "Golang" for product "Go" and version "1.9.1"
-
Affected
Golang
Search vendor "Golang"
Go
Search vendor "Golang" for product "Go"
1.9.2
Search vendor "Golang" for product "Go" and version "1.9.2"
-
Affected
Golang
Search vendor "Golang"
Go
Search vendor "Golang" for product "Go"
1.9.3
Search vendor "Golang" for product "Go" and version "1.9.3"
-
Affected
Golang
Search vendor "Golang"
Go
Search vendor "Golang" for product "Go"
1.10
Search vendor "Golang" for product "Go" and version "1.10"
beta1
Affected
Golang
Search vendor "Golang"
Go
Search vendor "Golang" for product "Go"
1.10
Search vendor "Golang" for product "Go" and version "1.10"
beta2
Affected
Golang
Search vendor "Golang"
Go
Search vendor "Golang" for product "Go"
1.10
Search vendor "Golang" for product "Go" and version "1.10"
rc1
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server
Search vendor "Redhat" for product "Enterprise Linux Server"
7.0
Search vendor "Redhat" for product "Enterprise Linux Server" and version "7.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Aus
Search vendor "Redhat" for product "Enterprise Linux Server Aus"
7.6
Search vendor "Redhat" for product "Enterprise Linux Server Aus" and version "7.6"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Eus
Search vendor "Redhat" for product "Enterprise Linux Server Eus"
7.6
Search vendor "Redhat" for product "Enterprise Linux Server Eus" and version "7.6"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Server Tus
Search vendor "Redhat" for product "Enterprise Linux Server Tus"
7.6
Search vendor "Redhat" for product "Enterprise Linux Server Tus" and version "7.6"
-
Affected