CVE-2025-21613
go-git has an Argument Injection via the URL field
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
go-git is a highly extensible git implementation library written in pure Go. An argument injection vulnerability was discovered in go-git versions prior to v5.13. Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags. This only happens when the file transport protocol is being used, as that is the only protocol that shells out to git binaries. This vulnerability is fixed in 5.13.0.
Go-git es una librería de implementación de Git altamente extensible escrita en Go puro. Se descubrió una vulnerabilidad de inyección de argumentos en versiones de Go-git anteriores a la v5.13. La explotación exitosa de esta vulnerabilidad podría permitir a un atacante establecer valores arbitrarios para los indicadores git-upload-pack. Esto solo sucede cuando se utiliza el protocolo de transporte de archivos, ya que es el único protocolo que realiza transferencias a binarios de Git. Esta vulnerabilidad se corrigió en la versión 5.13.0.
An argument injection vulnerability was found in go-git. This flaw allows an attacker to set arbitrary values to git-upload-pack flags, leading to command or code execution, exposure of sensitive data, or other unintended behavior. This is only possible in configurations where the file transport protocol is being used.
An update for grafana is now available for Red Hat Enterprise Linux 9.4 Extended Update Support. Issues addressed include a denial of service vulnerability.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-12-29 CVE Reserved
- 2025-01-06 CVE Published
- 2025-01-06 CVE Updated
- 2025-01-07 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://github.com/go-git/go-git/security/advisories/GHSA-v725-9546-7q7m | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2025-21613 | 2025-02-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2335888 | 2025-02-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Go-git Search vendor "Go-git" | Go-git Search vendor "Go-git" for product "Go-git" | >= 4.0.0 < 5.13.0 Search vendor "Go-git" for product "Go-git" and version " >= 4.0.0 < 5.13.0" | en |
Affected
|