Golang Go privilege escalation | CVE-2023-29403
NAME
__________
Golang Go privilege escalation
Platforms Affected:
Golang Go 1.20
Golang Go 1.19.9
Golang Go 1.20.4
Risk Level:
7.8
Exploitability:
Unproven
Consequences:
Gain Access
DESCRIPTION
__________
Golang Go could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw when a binary is run with the setuid/setgid bits. By sending a specially crafted request, an authenticated attacker could exploit this vulnerability to gain elevated privileges. to read or write contents of the registers.
CVSS 3.0 Information
__________
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Access Vector:
Local
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
![Golang Go privilege escalation | CVE-2023-29403 1 Buy Me A Coffee](https://www.redpacketsecurity.com/wp-content/uploads/2022/10/buymeacoffee.png)
![Golang Go privilege escalation | CVE-2023-29403 2 Patreon](https://www.redpacketsecurity.com/wp-content/uploads/2021/01/Digital-Patreon-Wordmark_FieryCoralv2-1024x209.png)
To keep up to date follow us on the below channels.