GHSA-p5wf-cmr4-xrwr: Permissive Regular Expression in tacquito
7.6
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
10/18/2024
Updated
11/1/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/facebookincubator/tacquito | go | < 0.0.0-20241011192817-07b49d1358e6 | 0.0.0-20241011192817-07b49d1358e6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The core vulnerability stems from 2 key points:
- In command.go's evaluate() function, regex patterns were applied without ^/$ anchors via regexp.MatchString, allowing substring matches
- CommandArgs() included line endings that could be abused to bypass intended restrictions
The commit patched both issues by:
- Adding automatic anchoring in evaluate()
- Introducing CommandArgsNoLE() to strip line endings
- Adding regex boundary checks Pre-patch versions lacked these safeguards, making these functions vulnerable to regex-based command injection through partial matches.