CVE-2022-41716Improper Neutralization of Null Byte or NUL Character in Standard Library OS Exec

Severity
7.5HIGHNVD
EPSS
0.0%
top 97.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 2
Latest updateNov 8

Description

Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D".

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5go_standard_library/os_exec1.19.0-01.19.3+1
CVEListV5go_standard_library/syscall1.19.0-01.19.3+1
NVDgolang/go1.19.01.19.3+1

Patches

🔴Vulnerability Details

4
OSV
CVE-2022-41716: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows2022-11-02
GHSA
GHSA-mh68-qf2j-8c5g: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows2022-11-02
CVEList
Unsanitized NUL in environment variables on Windows in syscall and os/exec2022-11-02
OSV
Unsanitized NUL in environment variables on Windows in syscall and os/exec2022-11-01

📋Vendor Advisories

2
Microsoft
Unsanitized NUL in environment variables on Windows in syscall and os/exec2022-11-08
Debian
CVE-2022-41716: golang-1.15 - Due to unsanitized NUL values, attackers may be able to maliciously set environm...2022
CVE-2022-41716 — Standard Library OS Exec vulnerability | cvebase