Remote command execution in Golang go get command allows an attacker to gain code execution on a system by installing a malicious library.# CVE-2018-6574
Remote command execution in `Golang` go get command.
CVE-2018-6574 this vulnerability impacts Golang go get command and allows an attacker to gain code execution on a system by installing a malicious library, this vulnerability was fixed in Go 1.8.7, 1.9.4 and 1.10rc2.
Golang will build native extensions. This can be used to pass additional flags to the compiler to gain code execution. For example, `CFLAGS` can be used.
[4.0K] /data/pocs/bdf3b86a759ed6ad764db17d0a52ff747717b693
├── [ 183] aaa.c
├── [ 15K] attack (1).so
├── [ 183] attack.c
├── [ 15K] attack.so
├── [ 134] exploit.c
├── [ 334] main.go
└── [ 443] README.md
0 directories, 7 files