According to the vulnerability that has been released on 27th of June; attackers may maliciosly set environment variables on Windows due to unsanitized NUL values.
In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. Therefore a malicious environment variable value can exploit this to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D". (CVE-2022-41716)
Affected Systems
Configuration 1
cpe:2.3:a:golang:go:*:*:*:*:*:*:*:* Up to (excluding) 1.18.8
cpe:2.3:a:golang:go:*:*:*:*:*:*:*:* From (including) 1.19.0 Up to (excluding) 1.19.3
Running on/with
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
IoC’s
-
Recommended Solution(s)
-
Mitigations
-
CVE / CWE
CVE-2022-41716
Related Website(s)
* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.
+90 216 504 53 32
Aydınevler Mahallesi,İsmet İnönü Cadddesi,Küçükyalı Ofis Park A Blok,No:20/1 Maltepe İstanbul
+90 312 235 44 51
You can register to our newsletter on the home page to be instantly informed about security vulnerabilities.