Due to unsanitized NUL values, attackers may be able to...
High severity
Unreviewed
Published
Nov 2, 2022
to the GitHub Advisory Database
•
Updated Jul 5, 2023
Description
Published by the National Vulnerability Database
Nov 2, 2022
Published to the GitHub Advisory Database
Nov 2, 2022
Last updated
Jul 5, 2023
Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".
References