{"id":"CVE-2023-49569","details":"A path traversal vulnerability was discovered in go-git versions prior to v5.11. This vulnerability allows an attacker to create and amend files across the filesystem. In the worse case scenario, remote code execution could be achieved.\n\nApplications are only affected if they are using the  ChrootOS https://pkg.go.dev/github.com/go-git/go-billy/v5/osfs#ChrootOS , which is the default when using \"Plain\" versions of Open and Clone funcs (e.g. PlainClone). Applications using  BoundOS https://pkg.go.dev/github.com/go-git/go-billy/v5/osfs#BoundOS  or in-memory filesystems are not affected by this issue.\nThis is a go-git implementation issue and does not affect the upstream git cli.\n\n\n","aliases":["GHSA-449p-3h89-pw88","GO-2024-2456"],"modified":"2026-03-13T07:46:54.656399Z","published":"2024-01-12T11:15:13.250Z","related":["CGA-ghfj-54hg-3xgm","GHSA-449p-3h89-pw88"],"references":[{"type":"ADVISORY","url":"https://github.com/go-git/go-git/security/advisories/GHSA-449p-3h89-pw88"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/go-git/go-git","events":[{"introduced":"bf3b1f1fb9e0a04d0f87511a7ded2562b48a19d8"},{"fixed":"5d08d3bd94c65a3b6c25c6fba6907d12b0dac4ca"}],"database_specific":{"versions":[{"introduced":"4.0.0"},{"fixed":"5.11.0"}]}}],"versions":["v4.0.0","v4.1.0","v4.1.1","v4.10.0","v4.11.0","v4.12.0","v4.13.0","v4.13.1","v4.2.0","v4.2.1","v4.3.0","v4.3.1","v4.4.0","v4.4.1","v4.5.0","v4.6.0","v4.7.0","v4.7.1","v4.8.0","v4.8.1","v4.9.0","v4.9.1","v5.0.0","v5.1.0","v5.10.0","v5.10.1","v5.2.0","v5.3.0","v5.4.0","v5.4.1","v5.4.2","v5.5.0","v5.5.1","v5.5.2","v5.6.0","v5.6.1","v5.7.0","v5.8.0","v5.8.1","v5.9.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-49569.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}