
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A path traversal vulnerability (CVE-2023-49569) was discovered in go-git versions prior to v5.11. The vulnerability affects all versions from 4.0.0 up to (excluding) 5.11.0. This security issue was disclosed on January 9, 2024, and allows attackers to create and amend files across the filesystem when using specific configurations (GitHub Advisory).
The vulnerability specifically affects applications using ChrootOS, which is the default configuration when using 'Plain' versions of Open and Clone functions (e.g., PlainClone). Applications using BoundOS or in-memory filesystems are not affected. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (Critical), with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating network attack vector, low attack complexity, no privileges required, and high impact on confidentiality, integrity, and availability (GitHub Advisory).
In the worst-case scenario, this vulnerability could lead to remote code execution (RCE). The high severity rating indicates potential significant impact on affected systems, allowing attackers to manipulate files across the filesystem. This is specifically a go-git implementation issue and does not affect the upstream git cli (GitHub Advisory).
Users running versions of go-git from v4 and above are strongly recommended to upgrade to v5.11 or later to mitigate this vulnerability. For cases where immediate upgrade is not possible, it is recommended to limit go-git usage to only trusted Git servers as a temporary workaround (GitHub Advisory).
The vulnerability was responsibly disclosed by security researcher Ionut Lalu. Multiple organizations, including Red Hat, have acknowledged the severity of this vulnerability and have been actively working on updating their affected products (Red Hat Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”