### [CVE-2024-6257](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6257) ![](https://img.shields.io/static/v1?label=Product&message=Shared%20library&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%201.7.4%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(Command%20Injection)&color=brighgreen) ### Description HashiCorp’s go-getter library can be coerced into executing Git update on an existing maliciously modified Git Configuration, potentially leading to arbitrary code execution. ### POC #### Reference No PoCs from references. #### Github - https://github.com/h4ckm1n-dev/report-test