Description
HashiCorp’s go-getter library can be coerced into executing Git update on an existing maliciously modified Git Configuration, potentially leading to arbitrary code execution.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2209 | HashiCorp’s go-getter library can be coerced into executing Git update on an existing maliciously modified Git Configuration, potentially leading to arbitrary code execution. |
Github GHSA |
GHSA-xfhp-jf8p-mh5w | HashiCorp go-getter Vulnerable to Code Execution On Git Update Via Git Config Manipulation |
References
History
Thu, 11 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:hashicorp:go-getter:*:*:*:*:*:*:*:* |
Status: PUBLISHED
Assigner: HashiCorp
Published:
Updated: 2024-08-01T21:33:05.245Z
Reserved: 2024-06-21T20:12:09.424Z
Link: CVE-2024-6257
Updated: 2024-08-01T21:33:05.245Z
Status : Analyzed
Published: 2024-06-25T17:15:10.827
Modified: 2025-12-11T20:02:00.840
Link: CVE-2024-6257
OpenCVE Enrichment
Updated: 2025-07-12T22:01:15Z
Weaknesses
EUVD
Github GHSA