<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1462084720533760&amp;ev=PageView&amp;noscript=1">
Blog
02.05.2021

CVE-2021-3115 Go Language- CMDi and RCE

Virsec Security Research Lab Vulnerability Analysis

The Virsec Security Research Lab provides timely, relevant analysis about recent and notable security vulnerabilities.

1.1        Vulnerability Summary

Go before 1.14.14 and 1.15.x before 1.15.7 on Windows is vulnerable to Command Injection and remote code execution when using the "go get" command to fetch modules that make use of cgo (for example, cgo can execute a gcc program from an untrusted download).

CVE-2021-3115: Golang (CMDi and RCE). Virsec Risk Index: 64%

Watch the video to learn more about this and other important vulnerabilities.

1.2        CVSS Score

The CVSS Base score of this vulnerability is not provided in NVD.

1.3        Affected Version

Go before 1.14.14 and 1.15.x before 1.15.7 on Windows

1.4        Vulnerability Attribution

This vulnerability is disclosed by MITRE.

1.5        Risk Impact

The language is often referred to as Golang because of its domain name, golang.org, but the proper name is Go. Go Lang is very popular interpreted language which has been used to write lot of popular software, such as :

  • Goolge

  • MongoDB

  • Netflix

  • Uber

  • Kubernetes and many more.

  •  

If an attacker is able to exploit this vulnerability, the attacker can plant backdoor via Command injection or via RCE will affect all the software’s using this version of Go. No public exploit is available for this vulnerability.

1.6        Virsec Security Platform (VSP) Support:

    • VSP-Web capability can detect all types of command injection attack and prevent this attack from being exploited.

    • VSP-Host monitors processes that are spawned which are not part of a set of whitelisted process. Any attempt to execute new command or unknown binary would be denied by VSP-Host’s Process Monitoring capability.

 

1.7        Reference Links:


 

Download the full vulnerability report to learn more about this and other important vulnerabilities.

Do you have a request for a vulnerability Virsec Security Research Lab to explore? Let us know!

About the Author
Satya Gupta is Virsec’s visionary founder, with over 25 years of expertise in embedded systems, network security and systems architecture. Satya has helped build and guide the company through key growth phases from initial funding (2015), developing core technology with key partners including Raytheon and Lockheed (2016-2018), to launching an enterprise class, GA product (2019). Prior to this, Satya built a highly profitable software design and consulting business targeting data networking, application security and industrial automation projects. He was also Director of Firmware Engineering at Narad Networks and Managing Director and Chief Engineer at Eastern Telecom and Tech Ltd. Satya has more than 40 patents in complex firmware architecture with products deployed to hundreds of thousands of users. He holds a BS degree in Engineering from the Indian Institute of Technology in Kanpur and additional degrees from the University of Massachusetts at Lowell.