CVE-2024-6257
Terraform Community vulnerability analysis and mitigation

Overview

HashiCorp's go-getter library (CVE-2024-6257) is affected by a vulnerability that can be exploited to execute arbitrary code through Git configuration manipulation. The vulnerability was discovered and disclosed on June 24, 2024, affecting go-getter versions up to 1.7.4. The issue has been assigned a CVSS v3.1 base score of 8.4 (HIGH) (HashiCorp Advisory).

Technical details

The vulnerability occurs during Git operations when go-getter attempts to clone a repository to a specified destination. After the initial cloning step that initializes a git config, an attacker can modify the Git configuration before the update process. The vulnerability is classified as CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating a command injection vulnerability. The CVSS vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H reflects the high severity of potential impact (HashiCorp Advisory).

Impact

If successfully exploited, this vulnerability could lead to arbitrary code execution on affected systems. The high CVSS score indicates potential severe impacts on confidentiality, integrity, and availability of the affected systems (HashiCorp Advisory).

Mitigation and workarounds

HashiCorp has released version 1.7.5 of go-getter to address this vulnerability. Users are strongly advised to upgrade to this version or later. Organizations should evaluate their usage of go-getter and assess the associated risks in their specific context (HashiCorp Advisory).

Community reactions

The vulnerability was identified and reported by Kraken Security Labs, demonstrating ongoing security research in the open-source supply chain. HashiCorp has acknowledged the responsible disclosure and coordinated the release of security fixes (HashiCorp Advisory).

Additional resources


SourceThis report was generated using AI

Related Terraform Community vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61725HIGH7.5
  • cAdvisorcAdvisor
  • thanos-operator-fips
NoYesOct 29, 2025
CVE-2025-61723HIGH7.5
  • cAdvisorcAdvisor
  • iptables-wrappers
NoYesOct 29, 2025
CVE-2025-58181MEDIUM5.3
  • cAdvisorcAdvisor
  • eksctl
NoYesNov 19, 2025
CVE-2025-47914MEDIUM5.3
  • cAdvisorcAdvisor
  • argocd-fips-3.2
NoYesNov 19, 2025
CVE-2025-61724MEDIUM5.3
  • cAdvisorcAdvisor
  • dockerize
NoYesOct 29, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management