repo_id
stringclasses 927
values | file_path
stringlengths 99
214
| content
stringlengths 2
4.15M
|
|---|---|---|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2885.yaml
|
id: GO-2024-2885
modules:
- module: github.com/stacklok/minder
versions:
- fixed: 0.0.51
vulnerable_at: 0.0.50
summary: Denial of service of Minder Server from maliciously crafted GitHub attestations in github.com/stacklok/minder
cves:
- CVE-2024-35238
ghsas:
- GHSA-8fmj-33gw-g7pw
references:
- advisory: https://github.com/stacklok/minder/security/advisories/GHSA-8fmj-33gw-g7pw
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-35238
- fix: https://github.com/stacklok/minder/commit/fe321d345b4f738de6a06b13207addc72b59f892
- web: https://github.com/stacklok/minder/blob/daccbc12e364e2d407d56b87a13f7bb24cbdb074/internal/verifier/sigstore/container/container.go#L271-L300
source:
id: GHSA-8fmj-33gw-g7pw
created: 2024-06-04T14:25:34.37589-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1640.yaml
|
id: GO-2023-1640
modules:
- module: github.com/dablelv/go-huge-util
versions:
- fixed: 0.0.34
vulnerable_at: 0.0.33
packages:
- package: github.com/dablelv/go-huge-util/zip
symbols:
- unzipFile
derived_symbols:
- Unzip
summary: Path traversal when unzipping files in github.com/dablelv/go-huge-util
cves:
- CVE-2023-28105
ghsas:
- GHSA-5g39-ppwg-6xx8
credits:
- '@cokeBeer'
references:
- advisory: https://github.com/dablelv/go-huge-util/security/advisories/GHSA-5g39-ppwg-6xx8
- fix: https://github.com/dablelv/go-huge-util/commit/0e308b0fac8973e6fa251b0ab095cdc5c1c0956b
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0104.yaml
|
id: GO-2021-0104
modules:
- module: github.com/pion/webrtc/v3
versions:
- fixed: 3.0.15
vulnerable_at: 3.0.14
packages:
- package: github.com/pion/webrtc/v3
symbols:
- DTLSTransport.Start
derived_symbols:
- PeerConnection.AddTrack
- PeerConnection.AddTransceiverFromKind
- PeerConnection.AddTransceiverFromTrack
- PeerConnection.CreateDataChannel
- PeerConnection.RemoveTrack
- PeerConnection.SetLocalDescription
- PeerConnection.SetRemoteDescription
- operations.Done
- operations.Enqueue
summary: Authorization bypass in github.com/pion/webrtc/v3
description: |-
Due to improper error handling, DTLS connections were not killed when
certificate verification failed, causing users who did not check the connection
state to continue to use the connection. This could allow allow an attacker
which holds the ICE password, but not a valid certificate, to bypass this
restriction.
published: 2021-07-28T18:08:05Z
cves:
- CVE-2021-28681
ghsas:
- GHSA-74xm-qj29-cq8p
credits:
- Gaukas Wang (@Gaukas)
references:
- fix: https://github.com/pion/webrtc/pull/1709
- fix: https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2e
- web: https://github.com/pion/webrtc/issues/1708
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1558.yaml
|
id: GO-2023-1558
modules:
- module: github.com/ipfs/go-bitfield
versions:
- fixed: 1.1.0
vulnerable_at: 1.0.0
packages:
- package: github.com/ipfs/go-bitfield
symbols:
- NewBitfield
- FromBytes
summary: Denial of service via malformed size parameters in github.com/ipfs/go-bitfield
description: |-
When feeding untrusted user input into the size parameter of NewBitfield and
FromBytes functions, an attacker can trigger panics.
This happens when the size is a not a multiple of 8 or is negative.
A workaround is to ensure size%8 == 0 && size >= 0 yourself before calling
NewBitfield or FromBytes.
cves:
- CVE-2023-23626
ghsas:
- GHSA-2h6c-j3gf-xp9r
credits:
- Jorropo
references:
- advisory: https://github.com/ipfs/go-bitfield/security/advisories/GHSA-2h6c-j3gf-xp9r
- fix: https://github.com/ipfs/go-bitfield/commit/5e1d256fe043fc4163343ccca83862c69c52e579
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2096.yaml
|
id: GO-2023-2096
modules:
- module: github.com/consensys/gnark-crypto
versions:
- fixed: 0.12.0
vulnerable_at: 0.11.2
packages:
- package: github.com/consensys/gnark-crypto/ecc/bls12-377/ecdsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/bls12-377/twistededwards
symbols:
- Signature.SetBytes
- package: github.com/consensys/gnark-crypto/ecc/bls12-378/ecdsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/bls12-378/twistededwards/eddsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/bls12-381/bandersnatch/eddsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/bls12-381/ecdsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/bls12-381/twistededwards/eddsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/bls24-315/ecdsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/bls24-315/twistededwards/eddsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/bls24-317/ecdsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/bls24-317/twistededwards/eddsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/bn254/ecdsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/bn254/twistededwards/eddsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/bw6-633/ecdsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/bw6-633/twistededwards/eddsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/bw6-756/ecdsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/bw6-756/twistededwards/eddsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/bw6-761/ecdsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/bw6-761/twistededwards/eddsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/secp256k1/ecdsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
- package: github.com/consensys/gnark-crypto/ecc/stark-curve/ecdsa
symbols:
- Signature.SetBytes
derived_symbols:
- PublicKey.Verify
summary: Signature malleability in github.com/consensys/gnark-crypto
cves:
- CVE-2023-44273
ghsas:
- GHSA-9xfq-8j3r-xp5g
references:
- fix: https://github.com/Consensys/gnark-crypto/pull/449
- web: https://verichains.io
- web: https://github.com/Consensys/gnark-crypto/releases/tag/v0.12.0
- advisory: https://github.com/advisories/GHSA-9xfq-8j3r-xp5g
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0318.yaml
|
id: GO-2022-0318
modules:
- module: cmd
versions:
- fixed: 1.16.14
- introduced: 1.17.0-0
- fixed: 1.17.7
vulnerable_at: 1.17.6
packages:
- package: cmd/go/internal/modfetch
symbols:
- codeRepo.convert
- codeRepo.validatePseudoVersion
skip_fix: 'TODO: revisit this reason (cant request explicit version v1.17.6 of standard library package cmd/go/internal/modfetch)'
summary: Incorrect access control in the go command in cmd/go/internal/modfetch
description: |-
Incorrect access control is possible in the go command.
The go command can misinterpret branch names that falsely appear to be version
tags. This can lead to incorrect access control if an actor is authorized to
create branches but not tags.
published: 2022-08-01T22:20:42Z
cves:
- CVE-2022-23773
references:
- fix: https://go.dev/cl/378400
- fix: https://go.googlesource.com/go/+/fa4d9b8e2bc2612960c80474fca83a4c85a974eb
- report: https://go.dev/issue/35671
- web: https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2409.yaml
|
id: GO-2023-2409
modules:
- module: github.com/dvsekhvalnov/jose2go
versions:
- fixed: 1.5.1-0.20231206184617-48ba0b76bc88
vulnerable_at: 1.5.0
packages:
- package: github.com/dvsekhvalnov/jose2go
symbols:
- Pbse2HmacAesKW.WrapNewKey
- Pbse2HmacAesKW.Unwrap
- encrypt
- decrypt
derived_symbols:
- Compress
- Decode
- DecodeBytes
- Encrypt
- EncryptBytes
summary: |-
Denial of service when decrypting attacker controlled input in
github.com/dvsekhvalnov/jose2go
description: |-
An attacker controlled input of a PBES2 encrypted JWE blob can have a very large
p2c value that, when decrypted, produces a denial-of-service.
cves:
- CVE-2023-50658
ghsas:
- GHSA-mhpq-9638-x6pw
- GHSA-6294-6rgp-fr7r
credits:
- '@mschwager'
references:
- web: https://github.com/dvsekhvalnov/jose2go/issues/31
- web: https://www.blackhat.com/us-23/briefings/schedule/#three-new-attacks-against-json-web-tokens-31695
- fix: https://github.com/dvsekhvalnov/jose2go/commit/a4584e9dd7128608fedbc67892eba9697f0d5317
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0422.yaml
|
id: GO-2022-0422
modules:
- module: github.com/ipld/go-codec-dagpb
versions:
- fixed: 1.3.1
vulnerable_at: 1.3.0
packages:
- package: github.com/ipld/go-codec-dagpb
symbols:
- DecodeBytes
derived_symbols:
- Decode
- Decoder
- Unmarshal
summary: Panic when decoding invalid blocks in github.com/ipld/go-codec-dagpb
description: The dag-pb codec can panic when decoding invalid blocks.
published: 2022-07-01T20:08:04Z
ghsas:
- GHSA-967g-cjx4-h7j6
- GHSA-g3vv-g2j5-45f2
references:
- fix: https://github.com/ipld/go-codec-dagpb/commit/a17ace35cc760a2698645c09868f9050fa219f57
cve_metadata:
id: CVE-2022-2584
cwe: 'CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0521.yaml
|
id: GO-2022-0521
modules:
- module: std
versions:
- fixed: 1.17.12
- introduced: 1.18.0-0
- fixed: 1.18.4
vulnerable_at: 1.18.3
packages:
- package: encoding/xml
symbols:
- Decoder.Skip
summary: Stack exhaustion from deeply nested XML documents in encoding/xml
description: |-
Calling Decoder.Skip when parsing a deeply nested XML document can cause a panic
due to stack exhaustion.
published: 2022-07-20T17:02:04Z
credits:
- Go Security Team
- Juho Nurminen of Mattermost
references:
- fix: https://go.dev/cl/417062
- fix: https://go.googlesource.com/go/+/08c46ed43d80bbb67cb904944ea3417989be4af3
- report: https://go.dev/issue/53614
- web: https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE
cve_metadata:
id: CVE-2022-28131
cwe: 'CWE-674: Uncontrolled Recursion'
description: |-
Uncontrolled recursion in Decoder.Skip in encoding/xml before Go 1.17.12 and Go
1.18.4 allows an attacker to cause a panic due to stack exhaustion via a deeply
nested XML document.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2901.yaml
|
id: GO-2024-2901
modules:
- module: github.com/ollama/ollama
versions:
- fixed: 0.1.34
vulnerable_at: 0.1.34-rc1
summary: Ollama does not validate the format of the digest (sha256 with 64 hex digits) in github.com/ollama/ollama
cves:
- CVE-2024-37032
ghsas:
- GHSA-8hqg-whrw-pv92
unknown_aliases:
- CGA-hv8x-jmgj-fp3m
references:
- advisory: https://github.com/advisories/GHSA-8hqg-whrw-pv92
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37032
- fix: https://github.com/ollama/ollama/commit/2a21363bb756a7341d3d577f098583865bd7603f
- fix: https://github.com/ollama/ollama/pull/4175
- web: https://github.com/ollama/ollama/blob/adeb40eaf29039b8964425f69a9315f9f1694ba8/server/modelpath_test.go#L41-L58
- web: https://github.com/ollama/ollama/compare/v0.1.33...v0.1.34
source:
id: GHSA-8hqg-whrw-pv92
created: 2024-06-26T14:08:48.678944-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2833.yaml
|
id: GO-2024-2833
modules:
- module: github.com/octo-sts/app
versions:
- fixed: 0.1.0
vulnerable_at: 0.0.0-20240502160256-1fc549c0973c
packages:
- package: github.com/octo-sts/app/pkg/provider
symbols:
- Get
summary: Denial of service in github.com/octo-sts/app
description: |-
Excessively large requests can be processed, consuming a
large amount of resources. This could potentially lead to
a denial of service.
cves:
- CVE-2024-34079
ghsas:
- GHSA-75r6-6jg8-pfcq
credits:
- '@enj'
references:
- advisory: https://github.com/octo-sts/app/security/advisories/GHSA-75r6-6jg8-pfcq
- fix: https://github.com/octo-sts/app/commit/74ba874c017cf973edd6711144cf4399a9fcff57
source:
id: CVE-2024-34079
created: 2024-05-11T07:37:36.149537-07:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2644.yaml
|
id: GO-2024-2644
modules:
- module: github.com/fluid-cloudnative/fluid
versions:
- fixed: 0.9.3
vulnerable_at: 0.9.2
summary: Fluid vulnerable to OS Command Injection for Fluid Users with JuicefsRuntime in github.com/fluid-cloudnative/fluid
cves:
- CVE-2023-51699
ghsas:
- GHSA-wx8q-4gm9-rj2g
references:
- advisory: https://github.com/fluid-cloudnative/fluid/security/advisories/GHSA-wx8q-4gm9-rj2g
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-51699
- fix: https://github.com/fluid-cloudnative/fluid/commit/02b7cd8b79a26092df95d625664994bda485c722
- fix: https://github.com/fluid-cloudnative/fluid/commit/e0184cff8790ad000c3e8943392c7f544fad7d66
source:
id: GHSA-wx8q-4gm9-rj2g
created: 2024-05-17T16:14:37.080903-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1737.yaml
|
id: GO-2023-1737
modules:
- module: github.com/gin-gonic/gin
versions:
- introduced: 1.3.1-0.20190301021747-ccb9e902956d
- fixed: 1.9.1
vulnerable_at: 1.9.0
packages:
- package: github.com/gin-gonic/gin
symbols:
- Context.FileAttachment
summary: |-
Improper handling of filenames in Content-Disposition HTTP header in
github.com/gin-gonic/gin
description: |-
The filename parameter of the Context.FileAttachment function is not properly
sanitized. A maliciously crafted filename can cause the Content-Disposition
header to be sent with an unexpected filename value or otherwise modify the
Content-Disposition header. For example, a filename of "setup.bat";x=.txt"
will be sent as a file named "setup.bat".
If the FileAttachment function is called with names provided by an untrusted
source, this may permit an attacker to cause a file to be served with a name
different than provided. Maliciously crafted attachment file name can modify the
Content-Disposition header.
ghsas:
- GHSA-2c4m-59x9-fr2g
credits:
- motoyasu-saburi
references:
- report: https://github.com/gin-gonic/gin/issues/3555
- fix: https://github.com/gin-gonic/gin/pull/3556
- web: https://github.com/gin-gonic/gin/releases/tag/v1.9.1
cve_metadata:
id: CVE-2023-29401
cwe: 'CWE 20: Improper Input Validation'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2466.yaml
|
id: GO-2024-2466
modules:
- module: gopkg.in/src-d/go-git.v4
versions:
- introduced: 4.7.1
vulnerable_at: 4.13.1
- module: github.com/go-git/go-git/v5
versions:
- introduced: 5.0.0
- fixed: 5.11.0
vulnerable_at: 5.10.1
packages:
- package: github.com/go-git/go-git/v5
symbols:
- checkFastForwardUpdate
- isFastForward
- InitWithOptions
- Repository.CreateTag
- Worktree.PullContext
- Worktree.createBranch
- Worktree.checkoutFileSymlink
derived_symbols:
- AddOptions.Validate
- Blame
- BlameResult.String
- Clone
- CloneContext
- CommitOptions.Validate
- CreateTagOptions.Validate
- GrepOptions.Validate
- GrepResult.String
- Init
- NoMatchingRefSpecError.Error
- Open
- PlainClone
- PlainCloneContext
- PlainInit
- PlainInitWithOptions
- PlainOpen
- PlainOpenWithOptions
- Remote.Fetch
- Remote.FetchContext
- Remote.List
- Remote.ListContext
- Remote.Push
- Remote.PushContext
- Remote.String
- Repository.BlobObject
- Repository.BlobObjects
- Repository.Branch
- Repository.Branches
- Repository.CommitObject
- Repository.CommitObjects
- Repository.Config
- Repository.ConfigScoped
- Repository.CreateBranch
- Repository.CreateRemote
- Repository.CreateRemoteAnonymous
- Repository.DeleteBranch
- Repository.DeleteObject
- Repository.DeleteRemote
- Repository.DeleteTag
- Repository.Fetch
- Repository.FetchContext
- Repository.Grep
- Repository.Head
- Repository.Log
- Repository.Notes
- Repository.Object
- Repository.Objects
- Repository.Prune
- Repository.Push
- Repository.PushContext
- Repository.Reference
- Repository.References
- Repository.Remote
- Repository.Remotes
- Repository.RepackObjects
- Repository.ResolveRevision
- Repository.SetConfig
- Repository.Tag
- Repository.TagObject
- Repository.TagObjects
- Repository.Tags
- Repository.TreeObject
- Repository.TreeObjects
- ResetOptions.Validate
- Status.String
- Submodule.Init
- Submodule.Repository
- Submodule.Status
- Submodule.Update
- Submodule.UpdateContext
- SubmoduleStatus.String
- Submodules.Init
- Submodules.Status
- Submodules.Update
- Submodules.UpdateContext
- SubmodulesStatus.String
- Worktree.Add
- Worktree.AddGlob
- Worktree.AddWithOptions
- Worktree.Checkout
- Worktree.Clean
- Worktree.Commit
- Worktree.Grep
- Worktree.Move
- Worktree.Pull
- Worktree.Remove
- Worktree.RemoveGlob
- Worktree.Reset
- Worktree.ResetSparsely
- Worktree.Status
- Worktree.Submodule
- Worktree.Submodules
- buildTreeHelper.BuildTree
- package: github.com/go-git/go-git/v5/config
symbols:
- RemoteConfig.Validate
- Branch.Validate
derived_symbols:
- Config.Unmarshal
- Config.Validate
- LoadConfig
- ReadConfig
- package: github.com/go-git/go-git/v5/plumbing/object
symbols:
- getFileStatsFromFilePatches
derived_symbols:
- Commit.Stats
- Commit.StatsContext
- Patch.Stats
- package: github.com/go-git/go-git/v5/storage/filesystem
symbols:
- NewStorageWithOptions
derived_symbols:
- ConfigStorage.Config
- ConfigStorage.SetConfig
- ModuleStorage.Module
- NewStorage
- ObjectStorage.EncodedObject
- package: github.com/go-git/go-git/v5/storage/filesystem/dotgit
symbols:
- DotGit.Alternates
summary: Denial of service in github.com/go-git/go-git/v5 and gopkg.in/src-d/go-git.v4
cves:
- CVE-2023-49568
ghsas:
- GHSA-mw99-9chc-xw7r
credits:
- Ionut Lalu
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-49568
notes:
- This is identical to GO-2024-2456.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0762.yaml
|
id: GO-2022-0762
modules:
- module: github.com/microcosm-cc/bluemonday
versions:
- fixed: 1.0.5
vulnerable_at: 1.0.4
packages:
- package: github.com/microcosm-cc/bluemonday
symbols:
- Policy.sanitize
derived_symbols:
- Policy.Sanitize
- Policy.SanitizeBytes
- Policy.SanitizeReader
summary: |-
Cross-site scripting due to incorrect sanitization in
github.com/microcosm-cc/bluemonday
description: |-
An XSS injection was possible because the sanitization of the Cyrillic character
i bypass a protection mechanism against user-inputted HTML elements such as the
<script> tag.
published: 2021-05-18T21:07:37Z
cves:
- CVE-2021-29272
ghsas:
- GHSA-3x58-xr87-2fcj
references:
- fix: https://github.com/microcosm-cc/bluemonday/commit/524f142fe46e945b7dcd291d7805c4b7dcf75bee
- web: https://github.com/microcosm-cc/bluemonday/issues/111
- web: https://github.com/microcosm-cc/bluemonday/releases/tag/v1.0.5
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0251.yaml
|
id: GO-2022-0251
modules:
- module: github.com/cloudflare/cfrpki
versions:
- fixed: 1.4.0
vulnerable_at: 1.3.0
packages:
- package: github.com/cloudflare/cfrpki/validator/lib
symbols:
- readObject
derived_symbols:
- BER2DER
- DecodeManifest
- DecoderConfig.DecodeManifest
summary: Panic on NUL character in ROA in github.com/cloudflare/cfrpki
description: |-
OctoRPKI crashes when a repository returns an invalid ROA that is only an
encoded NUL character (\0).
published: 2022-07-15T23:07:28Z
cves:
- CVE-2021-3910
ghsas:
- GHSA-5mxh-2qfv-4g7j
credits:
- Koen van Hove
references:
- fix: https://github.com/cloudflare/cfrpki/commit/76f0f7a98da001fa04e5bc0407c6702f91096bfa
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1878.yaml
|
id: GO-2023-1878
modules:
- module: std
versions:
- fixed: 1.19.11
- introduced: 1.20.0-0
- fixed: 1.20.6
vulnerable_at: 1.20.5
packages:
- package: net/http
symbols:
- Request.write
derived_symbols:
- Client.CloseIdleConnections
- Client.Do
- Client.Get
- Client.Head
- Client.Post
- Client.PostForm
- Get
- Head
- Post
- PostForm
- Request.Write
- Request.WriteProxy
- Transport.CancelRequest
- Transport.CloseIdleConnections
- Transport.RoundTrip
summary: Insufficient sanitization of Host header in net/http
description: |-
The HTTP/1 client does not fully validate the contents of the Host header. A
maliciously crafted Host header can inject additional headers or entire
requests.
With fix, the HTTP/1 client now refuses to send requests containing an invalid
Request.Host or Request.URL.Host value.
credits:
- Bartek Nowotarski
references:
- report: https://go.dev/issue/60374
- fix: https://go.dev/cl/506996
- web: https://groups.google.com/g/golang-announce/c/2q13H6LEEx0
cve_metadata:
id: CVE-2023-29406
cwe: 'CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers (''HTTP Request/Response Splitting'')'
references:
- https://security.netapp.com/advisory/ntap-20230814-0002/
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2849.yaml
|
id: GO-2024-2849
modules:
- module: github.com/dotmesh-io/dotmesh
unsupported_versions:
- last_affected: 0.8.1
vulnerable_at: 0.0.0-20200428140901-6bdf6885808f
summary: dotmesh arbitrary file read and/or write in github.com/dotmesh-io/dotmesh
cves:
- CVE-2020-26312
ghsas:
- GHSA-hf54-fq2m-p9v6
references:
- advisory: https://github.com/advisories/GHSA-hf54-fq2m-p9v6
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-26312
- advisory: https://securitylab.github.com/advisories/GHSL-2020-254-zipslip-dotmesh
- web: https://github.com/dotmesh-io/dotmesh/blob/master/pkg/archiver/tar.go#L255
source:
id: GHSA-hf54-fq2m-p9v6
created: 2024-06-04T14:27:24.630281-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1008.yaml
|
id: GO-2022-1008
modules:
- module: github.com/containers/buildah
versions:
- fixed: 1.27.1
vulnerable_at: 1.27.0
packages:
- package: github.com/containers/buildah
symbols:
- Builder.configureUIDGID
derived_symbols:
- Builder.Run
summary: Unauthorized file access in github.com/containers/buildah
description: |-
SGID programs executed in a container can access files that have negative group
permissions for the user's primary group.
Consider a file which is owned by user u1 and group g1, permits user and other
read access, and does NOT permit group read access. This file is readable by u1
and all other users except for ones in group g1.
A program with the set-group-ID (SGID) bit set assumes the primary group of the
program's group when it executes.
A user with the primary group g1 who executes an SGID program owned by group g2
should not be able to access the file described above. While the program
executes with the primary group g2, the group g1 should remain in its
supplementary groups, blocking access to the file.
Buildah does not correctly add g1 to the supplementary groups in this scenario,
permitting unauthorized access.
cves:
- CVE-2022-2990
ghsas:
- GHSA-fjm8-m7m6-2fjp
related:
- CVE-2022-2989
- CVE-2022-2995
- CVE-2022-36109
- CVE-2023-25173
- GHSA-4wjj-jwc9-2x96
- GHSA-hmfx-3pcx-653p
- GHSA-phjr-8j92-w5v7
- GHSA-rc4r-wh2q-q6c4
references:
- article: https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
- fix: https://github.com/containers/buildah/commit/4a8bf740e862f2438279c6feee2ea59ddf0cda0b
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2902.yaml
|
id: GO-2024-2902
modules:
- module: github.com/argoproj/argo-cd
vulnerable_at: 1.8.6
- module: github.com/argoproj/argo-cd/v2
versions:
- introduced: 2.9.3
- fixed: 2.9.17
- introduced: 2.10.0
- fixed: 2.10.12
- introduced: 2.11.0
- fixed: 2.11.3
vulnerable_at: 2.11.2
summary: Unauthenticated Access to sensitive settings in Argo CD in github.com/argoproj/argo-cd
cves:
- CVE-2024-37152
ghsas:
- GHSA-87p9-x75h-p4j2
unknown_aliases:
- BIT-argo-cd-2024-37152
references:
- advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-87p9-x75h-p4j2
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37152
- fix: https://github.com/argoproj/argo-cd/commit/256d90178b11b04bc8174d08d7b663a2a7b1771b
source:
id: GHSA-87p9-x75h-p4j2
created: 2024-06-26T14:08:53.979347-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1623.yaml
|
id: GO-2023-1623
modules:
- module: github.com/crossplane/crossplane-runtime
versions:
- introduced: 0.6.0
- fixed: 0.16.1
- introduced: 0.17.0
- fixed: 0.19.2
vulnerable_at: 0.19.1
packages:
- package: github.com/crossplane/crossplane-runtime/pkg/fieldpath
symbols:
- Paved.SetValue
derived_symbols:
- Paved.MergeValue
- Paved.SetBool
- Paved.SetNumber
- Paved.SetString
summary: Out-of-memory panic in github.com/crossplane/crossplane-runtime
description: |-
An out of memory panic vulnerability exists in the crossplane-runtime libraries.
Applications that use the Paved type's SetValue method with user-provided input
that is not properly validated might use excessive amounts of memory and cause
an out of memory panic.
In the fieldpath package, the Paved.SetValue method sets a value on the Paved
object according to the provided path, without any validation. This allows
setting values in slices at any provided index, which grows the target array up
to the requested index. The index is currently capped at max uint32
(4294967295), a large value. If callers do not validate paths' indexes on their
own, this could allow users to consume arbitrary amounts of memory.
Applications that do not use the Paved type's SetValue method are not affected.
Users unable to upgrade can work around this issue by parsing and validating the
path before passing it to the SetValue method of the Paved type, constraining
the index size as deemed appropriate.
cves:
- CVE-2023-27483
ghsas:
- GHSA-vfvj-3m3g-m532
credits:
- Disclosed by Ada Logics in a fuzzing audit sponsored by CNCF.
references:
- advisory: https://github.com/crossplane/crossplane-runtime/security/advisories/GHSA-vfvj-3m3g-m532
- fix: https://github.com/crossplane/crossplane-runtime/commit/53508a9f4374604db140dd8ab2fa52276441e738
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2382.yaml
|
id: GO-2023-2382
modules:
- module: std
versions:
- fixed: 1.20.12
- introduced: 1.21.0-0
- fixed: 1.21.5
vulnerable_at: 1.21.4
packages:
- package: net/http/internal
symbols:
- chunkedReader.beginChunk
- readChunkLine
derived_symbols:
- chunkedReader.Read
summary: Denial of service via chunk extensions in net/http
description: |-
A malicious HTTP sender can use chunk extensions to cause a receiver reading
from a request or response body to read many more bytes from the network than
are in the body.
A malicious HTTP client can further exploit this to cause a server to
automatically read a large amount of data (up to about 1GiB) when a handler
fails to read the entire body of a request.
Chunk extensions are a little-used HTTP feature which permit including
additional metadata in a request or response body sent using the chunked
encoding. The net/http chunked encoding reader discards this metadata. A sender
can exploit this by inserting a large metadata segment with each byte
transferred. The chunk reader now produces an error if the ratio of real body to
encoded bytes grows too small.
credits:
- Bartek Nowotarski
references:
- report: https://go.dev/issue/64433
- fix: https://go.dev/cl/547335
- web: https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ
cve_metadata:
id: CVE-2023-39326
cwe: 'CWE-400: Uncontrolled Resource Consumption'
references:
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIU6HOGV6RRIKWM57LOXQA75BGZSIH6G/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0246.yaml
|
id: GO-2022-0246
modules:
- module: github.com/cloudflare/cfrpki
versions:
- fixed: 1.3.0
vulnerable_at: 1.2.2
packages:
- package: github.com/cloudflare/cfrpki/validator/lib
symbols:
- ROAEntry.Validate
derived_symbols:
- RPKIROA.ValidateEntries
summary: Insufficient validation in github.com/cloudflare/cfrpki
description: |-
The ROAEntry.Validate function fails to perform bounds checks on the MaxLength
field, allowing invalid values to pass validation.
published: 2022-07-15T23:06:38Z
cves:
- CVE-2021-3761
ghsas:
- GHSA-c8xp-8mf3-62h9
credits:
- Job Snijders
references:
- fix: https://github.com/cloudflare/cfrpki/pull/90
- fix: https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2719.yaml
|
id: GO-2024-2719
modules:
- module: github.com/sigstore/cosign
vulnerable_at: 1.13.6
- module: github.com/sigstore/cosign/v2
versions:
- fixed: 2.2.4
unsupported_versions:
- last_affected: 2.2.3
vulnerable_at: 2.2.3
summary: Cosign malicious artifacts can cause machine-wide DoS in github.com/sigstore/cosign
cves:
- CVE-2024-29903
ghsas:
- GHSA-95pr-fxf5-86gv
unknown_aliases:
- BIT-cosign-2024-29903
references:
- advisory: https://github.com/sigstore/cosign/security/advisories/GHSA-95pr-fxf5-86gv
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-29903
- fix: https://github.com/sigstore/cosign/commit/629f5f8fa672973503edde75f84dcd984637629e
- web: https://github.com/sigstore/cosign/blob/14795db16417579fac0c00c11e166868d7976b61/pkg/cosign/verify.go#L948-L955
- web: https://github.com/sigstore/cosign/blob/286a98a4a99c1b2f32f84b0d560e324100312280/pkg/oci/remote/signatures.go#L56-L70
- web: https://github.com/sigstore/cosign/releases/tag/v2.2.4
source:
id: GHSA-95pr-fxf5-86gv
created: 2024-06-26T14:00:49.329229-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2922.yaml
|
id: GO-2024-2922
modules:
- module: github.com/cilium/cilium
versions:
- introduced: 1.13.0
- fixed: 1.13.17
- introduced: 1.14.0
- fixed: 1.14.12
- introduced: 1.15.0
- fixed: 1.15.6
vulnerable_at: 1.15.5
summary: Cilium leaks sensitive information in cilium-bugtool in github.com/cilium/cilium
cves:
- CVE-2024-37307
ghsas:
- GHSA-wh78-7948-358j
unknown_aliases:
- BIT-cilium-2024-37307
- BIT-cilium-operator-2024-37307
- BIT-hubble-2024-37307
- CGA-8w6w-3p6g-f399
- CGA-p2fw-jcxq-g6wg
- CGA-p8cv-xfxg-fg8f
- CGA-pqp4-rcvv-jvgj
- CGA-qm9x-3p47-5whw
references:
- advisory: https://github.com/cilium/cilium/security/advisories/GHSA-wh78-7948-358j
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37307
- fix: https://github.com/cilium/cilium/commit/0191b1ebcfdd61cefd06da0315a0e7d504167407
- fix: https://github.com/cilium/cilium/commit/224e288a5bf40d0bb0f16c9413693b319633431a
- fix: https://github.com/cilium/cilium/commit/9299c0fd0024e33397cffc666ff851e82af28741
- fix: https://github.com/cilium/cilium/commit/958d7b77274bf2c272d8cdfd812631d644250653
- fix: https://github.com/cilium/cilium/commit/9eb25ba40391a9b035d7e66401b862818f4aac4b
- fix: https://github.com/cilium/cilium/commit/bf9a1ae1b2d2b2c9cca329d7aa96aa4858032a61
source:
id: GHSA-wh78-7948-358j
created: 2024-06-26T14:09:36.703033-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2887.yaml
|
id: GO-2024-2887
modules:
- module: std
versions:
- fixed: 1.21.11
- introduced: 1.22.0-0
- fixed: 1.22.4
vulnerable_at: 1.22.3
packages:
- package: net/netip
symbols:
- Addr.IsLoopback
- Addr.IsMulticast
- Addr.IsInterfaceLocalMulticast
- Addr.IsLinkLocalMulticast
- Addr.IsGlobalUnicast
- Addr.IsPrivate
summary: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses in net/netip
description: |-
The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for
IPv4-mapped IPv6 addresses, returning false for addresses which would return
true in their traditional IPv4 forms.
credits:
- Enze Wang of Alioth (@zer0yu)
- Jianjun Chen of Zhongguancun Lab (@chenjj)
references:
- fix: https://go.dev/cl/590316
- report: https://go.dev/issue/67680
- web: https://groups.google.com/g/golang-announce/c/XbxouI9gY7k/m/TuoGEhxIEwAJ
cve_metadata:
id: CVE-2024-24790
cwe: 'CWE-180: Incorrect Behavior Order: Validate Before Canonicalize'
references:
- http://www.openwall.com/lists/oss-security/2024/06/04/1
source:
id: go-security-team
created: 2024-06-04T17:58:12.283051-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2591.yaml
|
id: GO-2024-2591
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 9.2.0+incompatible
- fixed: 9.2.5+incompatible
- introduced: 9.3.0+incompatible
- fixed: 9.3.1+incompatible
vulnerable_at: 9.3.1-rc2+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- fixed: 8.1.9
vulnerable_at: 8.0.0-20240626184126-817e18414e41
summary: Mattermost post fetching without auditing in compliance export in github.com/mattermost/mattermost-server
cves:
- CVE-2024-1887
ghsas:
- GHSA-fx48-xv6q-6gp3
unknown_aliases:
- CGA-9c85-rg9h-4w8m
references:
- advisory: https://github.com/advisories/GHSA-fx48-xv6q-6gp3
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1887
- web: https://mattermost.com/security-updates
source:
id: GHSA-fx48-xv6q-6gp3
created: 2024-06-26T16:10:47.852031-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1546.yaml
|
id: GO-2023-1546
modules:
- module: go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp
versions:
- introduced: 0.38.0
- fixed: 0.39.0
vulnerable_at: 0.38.0
packages:
- package: go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp
symbols:
- Handler.ServeHTTP
summary: |-
Denial of service in
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp
description: |-
The otelhttp package of opentelemetry-go-contrib is vulnerable to a
denial-of-service attack.
The otelhttp package uses the httpconv.ServerRequest function to annotate metric
measurements for the http.server.request_content_length,
http.server.response_content_length, and http.server.duration instruments. The
ServerRequest function sets the http.target attribute value to be the whole
request URI (including the query string). The metric instruments do not "forget"
previous measurement attributes when "cumulative" temporality is used, meaning
that the cardinality of the measurements allocated is directly correlated with
the unique URIs handled. If the query string is constantly random, this will
result in a constant increase in memory allocation that can be used in a
denial-of-service attack.
cves:
- CVE-2023-25151
ghsas:
- GHSA-5r5m-65gx-7vrh
related:
- CVE-2022-21698
- CVE-2023-45142
- GHSA-cg3q-j54f-5p7p
- GHSA-rcjv-mgp8-qvmr
references:
- advisory: https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-5r5m-65gx-7vrh
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0435.yaml
|
id: GO-2022-0435
modules:
- module: std
versions:
- fixed: 1.17.9
- introduced: 1.18.0-0
- fixed: 1.18.1
vulnerable_at: 1.18.0
packages:
- package: crypto/elliptic
symbols:
- p256GetScalar
derived_symbols:
- CurveParams.ScalarBaseMult
- CurveParams.ScalarMult
- p256Curve.CombinedMult
- p256Curve.ScalarBaseMult
- p256Curve.ScalarMult
summary: Panic due to large inputs affecting P-256 curves in crypto/elliptic
description: |-
A crafted scalar input longer than 32 bytes can cause P256().ScalarMult or
P256().ScalarBaseMult to panic. Indirect uses through crypto/ecdsa and
crypto/tls are unaffected. amd64, arm64, ppc64le, and s390x are unaffected.
published: 2022-05-20T21:17:46Z
cves:
- CVE-2022-28327
credits:
- Project Wycheproof
references:
- fix: https://go.dev/cl/397135
- fix: https://go.googlesource.com/go/+/37065847d87df92b5eb246c88ba2085efcf0b331
- report: https://go.dev/issue/52075
- web: https://groups.google.com/g/golang-announce/c/oecdBNLOml8
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0201.yaml
|
id: GO-2022-0201
modules:
- module: cmd
versions:
- fixed: 1.8.7
- introduced: 1.9.0-0
- fixed: 1.9.4
vulnerable_at: 1.9.3
packages:
- package: cmd/go
skip_fix: 'TODO: revisit this reason (cant request explicit version of standard library package cmd/go)'
summary: Remote command execution via "go get" command with cgo in cmd/go
description: |-
The "go get" command with cgo is vulnerable to remote command execution by
leveraging the gcc or clang plugin feature.
When cgo is enabled, the build step during "go get" invokes the host C compiler,
gcc or clang, adding compiler flags specified in the Go source files. Both gcc
and clang support a plugin mechanism in which a shared-library plugin is loaded
into the compiler, as directed by compiler flags. This means that a Go package
repository can contain an attack.so file along with a Go source file that says
(for example) "// #cgo CFLAGS: -fplugin=attack.so" causing the attack plugin to
be loaded into the host C compiler during the build. Gcc and clang plugins are
completely unrestricted in their access to the host system.
published: 2022-08-09T18:15:41Z
cves:
- CVE-2018-6574
credits:
- Christopher Brown of Mattermost
references:
- fix: https://go.googlesource.com/go/+/1dcb5836ad2c60776561da2923c70576ba2eefc6
- report: https://go.dev/issue/23672
- web: https://groups.google.com/g/golang-nuts/c/Gbhh1NxAjMU
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2792.yaml
|
id: GO-2024-2792
modules:
- module: github.com/argoproj/argo-cd
vulnerable_at: 1.8.6
- module: github.com/argoproj/argo-cd/v2
versions:
- fixed: 2.8.17
- introduced: 2.9.0
- fixed: 2.9.13
- introduced: 2.10.0
- fixed: 2.10.8
vulnerable_at: 2.10.7
summary: |-
Argo CD vulnerable to a Denial of Service via malicious jqPathExpressions in
ignoreDifferences in github.com/argoproj/argo-cd
cves:
- CVE-2024-32476
ghsas:
- GHSA-9m6p-x4h2-6frq
unknown_aliases:
- BIT-argo-cd-2024-32476
references:
- advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-9m6p-x4h2-6frq
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32476
- fix: https://github.com/argoproj/argo-cd/commit/7893979a1e78d59cedd0ba790ded24e30bb40657
- fix: https://github.com/argoproj/argo-cd/commit/9e5cc5a26ff0920a01816231d59fdb5eae032b5a
- fix: https://github.com/argoproj/argo-cd/commit/e2df7315fb7d96652186bf7435773a27be330cac
source:
id: GHSA-9m6p-x4h2-6frq
created: 2024-06-26T14:04:57.097041-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1113.yaml
|
id: GO-2022-1113
modules:
- module: github.com/oam-dev/kubevela
versions:
- fixed: 1.5.8
- introduced: 1.6.0
- fixed: 1.6.1
vulnerable_at: 1.6.0
packages:
- package: github.com/oam-dev/kubevela/pkg/utils/common
symbols:
- HTTPGetResponse
skip_fix: 'TODO: Revisit this reason. (Running fix causes error containing unknown revision konnectivity-client/v0.0.0)'
summary: Server-side request forgery in github.com/oam-dev/kubevela
description: |-
When using Helm Chart as the component delivery method, the request address of
the warehouse is not restricted, and there is a blind SSRF vulnerability.
cves:
- CVE-2022-39383
ghsas:
- GHSA-m5xf-x7q6-3rm7
references:
- advisory: https://github.com/kubevela/kubevela/security/advisories/GHSA-m5xf-x7q6-3rm7
- fix: https://github.com/kubevela/kubevela/pull/5000
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1664.yaml
|
id: GO-2023-1664
modules:
- module: github.com/crewjam/saml
versions:
- fixed: 0.4.13
vulnerable_at: 0.4.12
packages:
- package: github.com/crewjam/saml
symbols:
- NewIdpAuthnRequest
- ServiceProvider.ValidateLogoutResponseRedirect
derived_symbols:
- IdentityProvider.ServeSSO
- ServiceProvider.ValidateLogoutResponseRequest
summary: Denial of service via deflate compression bomb in github.com/crewjam/saml
cves:
- CVE-2023-28119
ghsas:
- GHSA-5mqj-xc49-246p
credits:
- '@nszetei'
references:
- advisory: https://github.com/crewjam/saml/security/advisories/GHSA-5mqj-xc49-246p
- fix: https://github.com/crewjam/saml/commit/8e9236867d176ad6338c870a84e2039aef8a5021
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2567.yaml
|
id: GO-2024-2567
modules:
- module: github.com/jackc/pgx/v5
versions:
- introduced: 5.0.0-alpha.5
- fixed: 5.5.2
vulnerable_at: 5.5.1
packages:
- package: github.com/jackc/pgx/v5/pgconn
symbols:
- Pipeline.Sync
summary: Panic in Pipeline when PgConn is busy or closed in github.com/jackc/pgx
description: Pipeline can panic when PgConn is busy or closed.
ghsas:
- GHSA-fqpg-rq76-99pq
references:
- fix: https://github.com/jackc/pgx/commit/dfd198003a03dbb96e4607b0d3a0bb9a7398ccb7
source:
id: go-security-team
created: 2024-07-02T11:36:18.541988-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0025.yaml
|
id: GO-2020-0025
modules:
- module: code.cloudfoundry.org/archiver
versions:
- fixed: 0.0.0-20180523222229-09b5706aa936
vulnerable_at: 0.0.0-20170223024658-7291196139d7
packages:
- package: code.cloudfoundry.org/archiver/extractor
symbols:
- extractTarArchiveFile
- extractZipArchiveFile
derived_symbols:
- detectableExtractor.Extract
- tarExtractor.Extract
- tgzExtractor.Extract
- zipExtractor.Extract
summary: Path traversal in code.cloudfoundry.org/archiver
description: |-
Due to improper path sanitization, archives containing relative file paths can
cause files to be written (or overwritten) outside of the target directory.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-32qh-8vg6-9g43
references:
- fix: https://github.com/cloudfoundry/archiver/commit/09b5706aa9367972c09144a450bb4523049ee840
- web: https://snyk.io/research/zip-slip-vulnerability
cve_metadata:
id: CVE-2018-25046
cwe: 'CWE 29: Path Traversal: "\..\filename"'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0079.yaml
|
id: GO-2021-0079
modules:
- module: github.com/bytom/bytom
versions:
- fixed: 1.0.4-0.20180831054840-1ac3c8ac4f2b
vulnerable_at: 1.0.4-0.20180831031436-69b3d4c7cf41
packages:
- package: github.com/bytom/bytom/p2p/discover
symbols:
- Network.checkTopicRegister
skip_fix: 'TODO: Revisit this reason. (Fix causes error containing cannot find module providing package github.com/bytom/common)'
summary: Panic in github.com/bytom/bytom
description: |-
A malformed query can cause an out-of-bounds panic due to improper validation of
arguments. If processing queries from untrusted parties, this may be used as a
vector for denial of service attacks.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2018-18206
ghsas:
- GHSA-vc3x-gx6c-g99f
credits:
- '@yahtoo'
references:
- fix: https://github.com/Bytom/bytom/pull/1307
- fix: https://github.com/Bytom/bytom/commit/1ac3c8ac4f2b1e1df9675228290bda6b9586ba42
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2899.yaml
|
id: GO-2024-2899
modules:
- module: chainguard.dev/apko
versions:
- fixed: 0.14.5
vulnerable_at: 0.14.4
summary: apko Exposure of HTTP basic auth credentials in log output in chainguard.dev/apko
cves:
- CVE-2024-36127
ghsas:
- GHSA-v6mg-7f7p-qmqp
references:
- advisory: https://github.com/chainguard-dev/apko/security/advisories/GHSA-v6mg-7f7p-qmqp
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-36127
- web: https://github.com/chainguard-dev/apko/commit/2c0533e4d52e83031a04f6a83ec63fc2a11eff01
source:
id: GHSA-v6mg-7f7p-qmqp
created: 2024-06-13T12:07:02.08859-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2675.yaml
|
id: GO-2024-2675
modules:
- module: github.com/temporalio/ui-server
vulnerable_at: 0.15.1
- module: github.com/temporalio/ui-server/v2
versions:
- fixed: 2.25.0
vulnerable_at: 2.24.0
summary: Temporal UI Server cross-site scripting vulnerability in github.com/temporalio/ui-server
cves:
- CVE-2024-2435
ghsas:
- GHSA-8f25-w7qj-r7hc
references:
- advisory: https://github.com/advisories/GHSA-8f25-w7qj-r7hc
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-2435
- web: https://github.com/temporalio/ui-server/releases/tag/v2.25.0
source:
id: GHSA-8f25-w7qj-r7hc
created: 2024-06-26T13:58:51.59593-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2375.yaml
|
id: GO-2023-2375
modules:
- module: std
versions:
- fixed: 1.20.0
vulnerable_at: 1.19.0
packages:
- package: crypto/tls
symbols:
- rsaKeyAgreement.processClientKeyExchange
- rsaKeyAgreement.generateClientKeyExchange
derived_symbols:
- Conn.Handshake
- Conn.HandshakeContext
- Conn.Read
- Conn.Write
- Dial
- DialWithDialer
- Dialer.Dial
- Dialer.DialContext
summary: |-
Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a
timing side channel
description: |-
Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which
is not constant time. RSA blinding was applied to prevent timing attacks, but
analysis shows this may not have been fully effective. In particular it appears
as if the removal of PKCS#1 padding may leak timing information, which in turn
could be used to recover session key bits.
In Go 1.20, the crypto/tls library switched to a fully constant time RSA
implementation, which we do not believe exhibits any timing side channels.
references:
- report: https://go.dev/issue/20654
- fix: https://go.dev/cl/326012/26
- web: https://groups.google.com/g/golang-announce/c/QMK8IQALDvA
- article: https://people.redhat.com/~hkario/marvin/
cve_metadata:
id: CVE-2023-45287
cwe: 'CWE-208: Observable Timing Discrepancy'
references:
- https://security.netapp.com/advisory/ntap-20240112-0005/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0475.yaml
|
id: GO-2022-0475
modules:
- module: cmd
versions:
- fixed: 1.14.12
- introduced: 1.15.0-0
- fixed: 1.15.5
vulnerable_at: 1.15.4
packages:
- package: cmd/go
symbols:
- Builder.cgo
skip_fix: 'TODO: revisit this reason (cant request explicit version v1.15.4 of standard library package cmd/go)'
- package: cmd/cgo
symbols:
- dynimport
skip_fix: 'TODO: revisit this reason (cant request explicit version v1.15.4 of standard library package cmd/go)'
summary: Arbitrary code execution in go command with cgo in cmd/go and cmd/cgo
description: |-
The go command may execute arbitrary code at build time when cgo is in use. This
may occur when running go get on a malicious package, or any other command that
builds untrusted code.
This can be caused by malicious unquoted symbol name in a linked object file.
published: 2022-07-28T17:24:30Z
credits:
- Chris Brown (Tempus Ex)
references:
- fix: https://go.dev/cl/269658
- fix: https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292
- report: https://go.dev/issue/42559
- web: https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
cve_metadata:
id: CVE-2020-28366
cwe: 'CWE-94: Improper Control of Generation of Code (''Code Injection'')'
description: |-
Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows
arbitrary code execution at build time via a malicious unquoted symbol name in a
linked object file.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0220.yaml
|
id: GO-2022-0220
modules:
- module: std
versions:
- fixed: 1.11.10
- introduced: 1.12.0-0
- fixed: 1.12.2
vulnerable_at: 1.12.1
packages:
- package: runtime
goos:
- windows
- package: syscall
goos:
- windows
symbols:
- LoadDLL
summary: DLL injection on Windows in runtime and syscall
description: |-
Go on Windows misused certain LoadLibrary functionality, leading to DLL
injection.
published: 2022-05-25T18:01:46Z
cves:
- CVE-2019-9634
credits:
- Samuel Cochran
- Jason Donenfeld
references:
- fix: https://go.dev/cl/165798
- fix: https://go.googlesource.com/go/+/9b6e9f0c8c66355c0f0575d808b32f52c8c6d21c
- report: https://go.dev/issue/28978
- web: https://groups.google.com/g/golang-announce/c/z9eTD34GEIs/m/Z_XmhTrVAwAJ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2513.yaml
|
id: GO-2024-2513
modules:
- module: github.com/grafana/grafana
non_go_versions:
- fixed: 7.2.1
vulnerable_at: 5.4.5+incompatible
summary: Grafana information disclosure in github.com/grafana/grafana
cves:
- CVE-2020-12458
ghsas:
- GHSA-3jq7-8ph8-63xm
unknown_aliases:
- BIT-grafana-2020-12458
references:
- advisory: https://github.com/advisories/GHSA-3jq7-8ph8-63xm
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-12458
- fix: https://github.com/grafana/grafana/commit/102448040d5132460e3b0013e03ebedec0677e00
- report: https://github.com/grafana/grafana/issues/8283
- web: https://access.redhat.com/security/cve/CVE-2020-12458
- web: https://bugzilla.redhat.com/show_bug.cgi?id=1827765
- web: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTQCKJZZYXMCSHJFZZ3YXEO5NUBANGZS
- web: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEBCIEVSYIDDCA7FTRS2IFUOYLIQU34A
- web: https://security.netapp.com/advisory/ntap-20200518-0001
source:
id: GHSA-3jq7-8ph8-63xm
created: 2024-06-14T11:39:09.292022-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0190.yaml
|
id: GO-2022-0190
modules:
- module: cmd
versions:
- fixed: 1.10.6
- introduced: 1.11.0-0
- fixed: 1.11.3
vulnerable_at: 1.11.2
packages:
- package: cmd/go/internal/get
symbols:
- downloadPackage
skip_fix: 'TODO: revisit this reason (cant request explicit version v1.11.2 of standard library package cmd/go/internal/get'
summary: Directory traversal via "go get" command in cmd/go
description: |-
The "go get" command is vulnerable to directory traversal when executed with the
import path of a malicious Go package which contains curly brace (both '{' and
'}' characters).
Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the
distinction is documented at
https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an
arbitrary filesystem write, which can lead to code execution.
published: 2022-08-02T15:44:23Z
cves:
- CVE-2018-16874
credits:
- ztz of Tencent Security Platform
references:
- fix: https://go.dev/cl/154101
- fix: https://go.googlesource.com/go/+/bc82d7c7db83487e05d7a88e06549d4ae2a688c3
- report: https://go.dev/issue/29230
- web: https://groups.google.com/g/golang-announce/c/Kw31K8G7Fi0
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0110.yaml
|
id: GO-2021-0110
modules:
- module: github.com/ory/fosite
versions:
- fixed: 0.31.0
vulnerable_at: 0.30.6
packages:
- package: github.com/ory/fosite
symbols:
- Fosite.AuthenticateClient
derived_symbols:
- Fosite.NewAccessRequest
- Fosite.NewRevocationRequest
summary: Token reuse in github.com/ory/fosite
description: Uniqueness of JWT IDs (jti) are not checked, allowing the JWT to be replayed.
published: 2021-07-28T18:08:05Z
cves:
- CVE-2020-15222
ghsas:
- GHSA-v3q9-2p3m-7g43
references:
- fix: https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2815.yaml
|
id: GO-2024-2815
modules:
- module: github.com/pterodactyl/wings
versions:
- fixed: 1.11.12
vulnerable_at: 1.11.11
summary: |-
Pterodactyl Wings vulnerable to Server-Side Request Forgery during remote file
pull in github.com/pterodactyl/wings
cves:
- CVE-2024-34068
ghsas:
- GHSA-qq22-jj8x-4wwv
related:
- GHSA-6rg3-8h8x-5xfv
references:
- advisory: https://github.com/pterodactyl/wings/security/advisories/GHSA-qq22-jj8x-4wwv
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-34068
- fix: https://github.com/pterodactyl/wings/commit/c152e36101aba45d8868a9a0eeb890995e8934b8
- web: https://github.com/pterodactyl/wings/security/advisories/GHSA-6rg3-8h8x-5xfv
notes:
- manually moved GHSA-6rg3-8h8x-5xfv to related section and re-classified advisory to web
source:
id: GHSA-qq22-jj8x-4wwv
created: 2024-06-26T14:06:28.726486-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0433.yaml
|
id: GO-2022-0433
modules:
- module: std
versions:
- fixed: 1.17.9
- introduced: 1.18.0-0
- fixed: 1.18.1
vulnerable_at: 1.18.0
packages:
- package: encoding/pem
symbols:
- Decode
summary: Stack overflow from a large amount of PEM data in encoding/pem
description: |-
encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack
overflow via a large amount of PEM data.
published: 2022-05-20T21:17:25Z
cves:
- CVE-2022-24675
credits:
- Juho Nurminen of Mattermost
references:
- fix: https://go.dev/cl/399820
- fix: https://go.googlesource.com/go/+/45c3387d777caf28f4b992ad9a6216e3085bb8fe
- report: https://go.dev/issue/51853
- web: https://groups.google.com/g/golang-announce/c/oecdBNLOml8
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0706.yaml
|
id: GO-2022-0706
modules:
- module: go.elastic.co/apm
versions:
- fixed: 1.11.0
vulnerable_at: 1.10.0
packages:
- package: go.elastic.co/apm
symbols:
- modelWriter.buildModelTransaction
derived_symbols:
- NewTracer
- NewTracerOptions
summary: Information disclosure in go.elastic.co/apm
description: |-
Sensitive HTTP headers may not be properly sanitized before being sent to the
APM server if the program panics.
published: 2021-05-18T18:34:18Z
cves:
- CVE-2021-22133
ghsas:
- GHSA-qqc5-rgcc-cjqh
references:
- fix: https://github.com/elastic/apm-agent-go/pull/888
- fix: https://github.com/elastic/apm-agent-go/commit/dd3e8c593580e7b80a98b57e1cc6e017e56747b4
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0619.yaml
|
id: GO-2022-0619
modules:
- module: github.com/emicklei/go-restful
versions:
- fixed: 2.16.0+incompatible
vulnerable_at: 2.15.0+incompatible
packages:
- package: github.com/emicklei/go-restful
symbols:
- CrossOriginResourceSharing.isOriginAllowed
derived_symbols:
- CrossOriginResourceSharing.Filter
- module: github.com/emicklei/go-restful/v2
versions:
- introduced: 2.7.1
vulnerable_at: 2.7.1
packages:
- package: github.com/emicklei/go-restful/v2
symbols:
- CrossOriginResourceSharing.isOriginAllowed
derived_symbols:
- CrossOriginResourceSharing.Filter
- module: github.com/emicklei/go-restful/v3
versions:
- introduced: 3.0.0
- fixed: 3.8.0
vulnerable_at: 3.7.4
packages:
- package: github.com/emicklei/go-restful/v3
symbols:
- CrossOriginResourceSharing.isOriginAllowed
derived_symbols:
- CrossOriginResourceSharing.Filter
summary: |-
Authorization bypass in github.com/emicklei/go-restful, go-restful/v2 and
go-restful/v3
description: |-
CORS filters that use an AllowedDomains configuration parameter can match
domains outside the specified set, permitting an attacker to avoid the CORS
policy.
The AllowedDomains configuration parameter is documented as a list of allowed
origin domains, but values in this list are applied as regular expression
matches. For example, an allowed domain of "example.com" will match the Origin
header "example.com.malicious.domain".
published: 2022-08-15T18:05:29Z
cves:
- CVE-2022-1996
ghsas:
- GHSA-r48q-9g5r-8q2h
references:
- fix: https://github.com/emicklei/go-restful/commit/f292efff46ae17e9d104f865a60a39a2ae9402f1
- web: https://github.com/emicklei/go-restful/issues/489
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2930.yaml
|
id: GO-2024-2930
modules:
- module: github.com/rancher/rke
versions:
- introduced: 1.4.18
- fixed: 1.4.19
- introduced: 1.5.9
- fixed: 1.5.10
vulnerable_at: 1.5.10-rc.1
packages:
- package: github.com/rancher/rke/k8s
symbols:
- UpdateSecret
- GetSecretsList
- GetSecret
- GetSystemSecret
- package: github.com/rancher/rke/cluster
symbols:
- SaveFullStateToKubernetes
- RebuildState
- GetK8sVersion
- Cluster.GetStateFileFromConfigMap
- Cluster.StoreAddonConfigMap
- FullState.WriteStateFile
- buildFreshState
- ReadStateFile
- GetStateFromKubernetes
derived_symbols:
- Cluster.CheckClusterPorts
- Cluster.CleanDeadLogs
- Cluster.CleanupNodes
- Cluster.ClusterRemove
- Cluster.DeployControlPlane
- Cluster.DeployRestoreCerts
- Cluster.DeployStateFile
- Cluster.DeployWorkerPlane
- Cluster.DisableSecretsEncryption
- Cluster.PrePullK8sImages
- Cluster.ReconcileDesiredStateEncryptionConfig
- Cluster.RewriteSecrets
- Cluster.RotateEncryptionKey
- Cluster.RunSELinuxCheck
- Cluster.SetUpHosts
- Cluster.SyncLabelsAndTaints
- Cluster.TunnelHosts
- Cluster.UpdateClusterCurrentState
- Cluster.UpgradeControlPlane
- Cluster.UpgradeWorkerPlane
- ConfigureCluster
- GetClusterCertsFromKubernetes
- RebuildKubeconfig
- ReconcileCluster
- ReconcileEncryptionProviderConfig
- RestartClusterPods
- package: github.com/rancher/rke/cmd
symbols:
- ClusterUp
- getStateFile
- saveClusterState
derived_symbols:
- ClusterInit
- ClusterRemove
- RestoreEtcdSnapshot
- RestoreEtcdSnapshotFromCli
- RetrieveClusterStateConfigMap
- RotateEncryptionKey
- SnapshotRemoveFromEtcdHosts
- SnapshotSaveEtcdHosts
- SnapshotSaveEtcdHostsFromCli
summary: RKE credentials are stored in the RKE1 Cluster state ConfigMap in github.com/rancher/rke
description: |-
When RKE provisions a cluster, it stores the cluster state in a configmap called
"full-cluster-state" inside the "kube-system" namespace of the cluster itself.
This cluster state object contains information used to set up the K8s cluster,
which may include sensitive data.
cves:
- CVE-2023-32191
ghsas:
- GHSA-6gr4-52w6-vmqx
references:
- advisory: https://github.com/rancher/rke/security/advisories/GHSA-6gr4-52w6-vmqx
- fix: https://github.com/rancher/rke/commit/cf49199481a1891909acb1384eed73a5c987d5bd
- fix: https://github.com/rancher/rke/commit/f7485b8dce376db0fc15a7c3ceb3de7029c8d0cf
source:
id: GHSA-6gr4-52w6-vmqx
created: 2024-07-01T13:30:12.796528-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2653.yaml
|
id: GO-2024-2653
modules:
- module: github.com/cilium/cilium
versions:
- introduced: 1.13.9
- fixed: 1.13.13
- introduced: 1.14.0
- fixed: 1.14.8
- introduced: 1.15.0
- fixed: 1.15.2
vulnerable_at: 1.15.1
summary: HTTP policy bypass in github.com/cilium/cilium
description: |-
Cilium's HTTP policies are not consistently applied to all traffic in the scope
of the policies, leading to HTTP traffic being incorrectly and intermittently
forwarded when it should be dropped.
cves:
- CVE-2024-28248
ghsas:
- GHSA-68mj-9pjq-mc85
credits:
- '@romikps'
- '@sayboras'
- '@jrajahalme'
references:
- web: https://docs.cilium.io/en/stable/security/policy/language/#http
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2486.yaml
|
id: GO-2024-2486
modules:
- module: github.com/hashicorp/vault
versions:
- introduced: 0.9.0
- fixed: 1.3.4
vulnerable_at: 1.3.3
summary: HashiCorp Vault Improper Privilege Management in github.com/hashicorp/vault
cves:
- CVE-2020-10660
ghsas:
- GHSA-m979-w9wj-qfj9
unknown_aliases:
- BIT-vault-2020-10660
references:
- advisory: https://github.com/advisories/GHSA-m979-w9wj-qfj9
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-10660
- fix: https://github.com/hashicorp/vault/commit/18485ee9d4352ac8e8396c580b5941ccf8e5b31a
- fix: https://github.com/hashicorp/vault/pull/8606
- web: https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#134-march-19th-2020
- web: https://www.hashicorp.com/blog/category/vault
source:
id: GHSA-m979-w9wj-qfj9
created: 2024-06-14T11:37:27.238275-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2671.yaml
|
id: GO-2024-2671
modules:
- module: github.com/hashicorp/nomad
versions:
- introduced: 0.11.0
- fixed: 1.4.11
- introduced: 1.5.0
- fixed: 1.5.7
vulnerable_at: 1.4.10
packages:
- package: github.com/hashicorp/nomad/acl
symbols:
- ACL.AllowVariableSearch
- package: github.com/hashicorp/nomad/nomad
symbols:
- sufficientSearchPerms
- filteredSearchContexts
- getEnterpriseFuzzyResourceIter
derived_symbols:
- ACL.GetPolicies
- ACL.GetPolicy
- ACL.GetRoleByID
- ACL.GetRoleByName
- ACL.GetRolesByID
- ACL.GetToken
- ACL.GetTokens
- ACL.ListPolicies
- ACL.ListRoles
- ACL.ListTokens
- Alloc.GetAlloc
- Alloc.GetAllocs
- Alloc.GetServiceRegistrations
- Alloc.List
- CSIPlugin.Get
- CSIPlugin.List
- CSIVolume.Get
- CSIVolume.List
- Deployment.Allocations
- Deployment.GetDeployment
- Deployment.List
- Eval.Allocations
- Eval.Count
- Eval.GetEval
- Eval.List
- Job.Allocations
- Job.Deployments
- Job.Dispatch
- Job.Evaluations
- Job.GetJob
- Job.GetJobVersions
- Job.GetServiceRegistrations
- Job.LatestDeployment
- Job.List
- Job.Plan
- Job.ScaleStatus
- Job.Summary
- Keyring.Get
- Keyring.List
- Namespace.GetNamespace
- Namespace.GetNamespaces
- Namespace.ListNamespaces
- NewServer
- NewWorker
- Node.GetAllocs
- Node.GetClientAllocs
- Node.GetNode
- Node.List
- PeriodicDispatch.SetEnabled
- Scaling.GetPolicy
- Scaling.ListPolicies
- Search.FuzzySearch
- Search.PrefixSearch
- Server.Reload
- Server.RunningChildren
- Server.SetSchedulerWorkerConfig
- ServiceRegistration.GetService
- ServiceRegistration.List
- TestACLServer
- TestServer
- TestServerErr
- Variables.List
- Variables.Read
- Worker.Start
- nomadFSM.Apply
- nomadFSM.Restore
- nomadFSM.RestoreWithFilter
summary: CSI plugin names disclosure in github.com/hashicorp/nomad
description: |-
A vulnerability was identified in Nomad such that the search HTTP API
can reveal names of available CSI plugins to unauthenticated users or
users without the plugin:read policy. This vulnerability affects Nomad
since 0.11.0 and was fixed in 1.4.11 and 1.5.7.
cves:
- CVE-2023-3300
ghsas:
- GHSA-v5fm-hr72-27hx
credits:
- anonymous4ACL24
references:
- fix: https://github.com/hashicorp/nomad/commit/a8789d3872bbf1b1f420f28b0f7ad8532a41d5e3
- web: https://discuss.hashicorp.com/t/hcsec-2023-22-nomad-search-api-leaks-information-about-csi-plugins/56272
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0160.yaml
|
id: GO-2021-0160
modules:
- module: std
versions:
- introduced: 1.5.0-0
- fixed: 1.5.3
vulnerable_at: 1.5.2
packages:
- package: math/big
symbols:
- nat.expNNMontgomery
- nat.montgomery
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Incorrect calculation affecting RSA computations in math/big
description: |-
Int.Exp Montgomery mishandled carry propagation and produced an incorrect
output, which makes it easier for attackers to obtain private RSA keys via
unspecified vectors.
This issue can affect RSA computations in crypto/rsa, which is used by
crypto/tls. TLS servers on 32-bit systems could plausibly leak their RSA private
key due to this issue. Other protocol implementations that create many RSA
signatures could also be impacted in the same way.
Specifically, incorrect results in one part of the RSA Chinese Remainder
computation can cause the result to be incorrect in such a way that it leaks one
of the primes. While RSA blinding should prevent an attacker from crafting
specific inputs that trigger the bug, on 32-bit systems the bug can be expected
to occur at random around one in 2^26 times. Thus collecting around 64 million
signatures (of known data) from an affected server should be enough to extract
the private key used.
Note that on 64-bit systems, the frequency of the bug is so low (less than one
in 2^50) that it would be very difficult to exploit.
published: 2022-01-05T15:31:16Z
cves:
- CVE-2015-8618
credits:
- Nick Craig-Wood
references:
- fix: https://go.dev/cl/18491
- fix: https://go.googlesource.com/go/+/1e066cad1ba23f4064545355b8737e4762dd6838
- fix: https://go.googlesource.com/go/+/4306352182bf94f86f0cfc6a8b0ed461cbf1d82c
- fix: https://go.dev/cl/17672
- report: https://go.dev/issue/13515
- web: https://groups.google.com/g/golang-announce/c/MEATuOi_ei4
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2874.yaml
|
id: GO-2024-2874
modules:
- module: github.com/cosmos/ibc-go
- module: github.com/cosmos/ibc-go/v2
- module: github.com/cosmos/ibc-go/v3
- module: github.com/cosmos/ibc-go/v4
- module: github.com/cosmos/ibc-go/v5
- module: github.com/cosmos/ibc-go/v6
- module: github.com/cosmos/ibc-go/v7
versions:
- fixed: 7.0.1
vulnerable_at: 7.0.1-wasm-client
packages:
- package: github.com/cosmos/ibc-go/v7/modules/core/04-channel/keeper
symbols:
- Keeper.UnreceivedPackets
summary: |-
Inter-Blockchain Communication (IBC) protocol "Huckleberry" vulnerability in
github.com/cosmos/ibc-go
description: |-
The ibc-go module is affected by the Inter-Blockchain Communication (IBC)
protocol "Huckleberry" vulnerability. The vulnerability allowed an attacker to
send arbitrary transactions onto target chains and trigger arbitrary state
transitions, including but not limited to, theft of funds. It was possible to
exploit this vulnerability in specific situations involving relaying packets in
which the source chain is also the final destination chain. Affected networks
are those that allow for fee grant capabilities and use a native Relayer (e.g.,
Osmosis and Juno).
ghsas:
- GHSA-qjcv-rx3v-7mvj
references:
- fix: https://github.com/cosmos/ibc-go/commit/c77f80f812940fe3b93980d13a5cdd6980e907cc
- report: https://github.com/cosmos/ibc-go/issues/1532
source:
id: GHSA-qjcv-rx3v-7mvj
created: 2024-05-22T16:53:22.072180612Z
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0001.yaml
|
id: GO-2020-0001
modules:
- module: github.com/gin-gonic/gin
versions:
- fixed: 1.6.0
vulnerable_at: 1.5.0
packages:
- package: github.com/gin-gonic/gin
symbols:
- LoggerWithConfig
derived_symbols:
- Default
- Logger
- LoggerWithFormatter
- LoggerWithWriter
summary: Arbitrary log line injection in github.com/gin-gonic/gin
description: |-
The default Formatter for the Logger middleware (LoggerConfig.Formatter), which
is included in the Default engine, allows attackers to inject arbitrary log
entries by manipulating the request path.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-6vm3-jj99-7229
credits:
- '@thinkerou <thinkerou@gmail.com>'
references:
- fix: https://github.com/gin-gonic/gin/pull/2237
- fix: https://github.com/gin-gonic/gin/commit/a71af9c144f9579f6dbe945341c1df37aaf09c0d
cve_metadata:
id: CVE-2020-36567
cwe: CWE-117 Improper Output Neutralization for Logs
description: |-
Unsanitized input in the default logger in github.com/gin-gonic/gin before
v1.6.0 allows remote attackers to inject arbitrary log lines.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1589.yaml
|
id: GO-2023-1589
modules:
- module: github.com/notaryproject/notation-go
versions:
- fixed: 1.0.0-rc.3
vulnerable_at: 1.0.0-rc.1
packages:
- package: github.com/notaryproject/notation-go/internal/pkix
symbols:
- ParseDistinguishedName
- package: github.com/notaryproject/notation-go/verifier
symbols:
- verifyX509TrustedIdentities
derived_symbols:
- New
- NewFromConfig
- verifier.Verify
- package: github.com/notaryproject/notation-go/verifier/trustpolicy
symbols:
- validateTrustedIdentities
derived_symbols:
- Document.Validate
summary: Denial of service from memory exhaustion in github.com/notaryproject/notation-go
description: |-
Parsing PKIX distinguished names containing the string "=#" can cause excessive
memory consumption.
cves:
- CVE-2023-25656
ghsas:
- GHSA-87x9-7grx-m28v
references:
- fix: https://github.com/notaryproject/notation-go/pull/275
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2045.yaml
|
id: GO-2023-2045
modules:
- module: std
versions:
- introduced: 1.21.0-0
- fixed: 1.21.1
vulnerable_at: 1.21.0
packages:
- package: crypto/tls
symbols:
- QUICConn.HandleData
summary: Memory exhaustion in QUIC connection handling in crypto/tls
description: |-
QUIC connections do not set an upper bound on the amount of data buffered when
reading post-handshake messages, allowing a malicious QUIC connection to cause
unbounded memory growth.
With fix, connections now consistently reject messages larger than 65KiB in
size.
credits:
- Marten Seemann
references:
- report: https://go.dev/issue/62266
- fix: https://go.dev/cl/523039
- web: https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
cve_metadata:
id: CVE-2023-39322
cwe: 'CWE-400: Uncontrolled Resource Consumption'
references:
- https://security.netapp.com/advisory/ntap-20231020-0004/
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0067.yaml
|
id: GO-2021-0067
modules:
- module: std
versions:
- introduced: 1.16.0-0
- fixed: 1.16.1
vulnerable_at: 1.16.0
packages:
- package: archive/zip
symbols:
- toValidName
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Panic when opening archives in archive/zip
description: |-
Using Reader.Open on an archive containing a file with a path prefixed by "../"
will cause a panic due to a stack overflow. If parsing user supplied archives,
this may be used as a denial of service vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2021-27919
references:
- fix: https://go.dev/cl/300489
- fix: https://go.googlesource.com/go/+/cd3b4ca9f20fd14187ed4cdfdee1a02ea87e5cd8
- report: https://go.dev/issue/44916
- web: https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw/m/zzhWj5jPAQAJ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2572.yaml
|
id: GO-2024-2572
modules:
- module: github.com/cosmos/cosmos-sdk
versions:
- fixed: 0.47.9
- introduced: 0.50.0
- fixed: 0.50.4
vulnerable_at: 0.50.3
packages:
- package: github.com/cosmos/cosmos-sdk/x/auth/vesting
symbols:
- msgServer.CreatePeriodicVestingAccount
summary: |-
Missing BlockedAddressed Validation in Vesting Module in
github.com/cosmos/cosmos-sdk
ghsas:
- GHSA-4j93-fm92-rp4m
references:
- advisory: https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-4j93-fm92-rp4m
- fix: https://github.com/cosmos/cosmos-sdk/commit/c05850241e2d615721e3492d15fee4e1deec082b
- web: https://github.com/cosmos/cosmos-sdk/releases/tag/v0.47.9
- web: https://github.com/cosmos/cosmos-sdk/releases/tag/v0.50.4
source:
id: GHSA-4j93-fm92-rp4m
created: 2024-07-01T15:01:58.512805-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0052.yaml
|
id: GO-2021-0052
modules:
- module: github.com/gin-gonic/gin
versions:
- fixed: 1.7.7
vulnerable_at: 1.7.6
packages:
- package: github.com/gin-gonic/gin
symbols:
- Context.ClientIP
- Context.RemoteIP
derived_symbols:
- Context.Next
- Engine.HandleContext
- Engine.Run
- Engine.RunFd
- Engine.RunListener
- Engine.RunTLS
- Engine.RunUnix
- Engine.ServeHTTP
summary: Inconsistent interpretation of HTTP Requests in github.com/gin-gonic/gin
description: |-
Due to improper HTTP header sanitization, a malicious user can spoof their
source IP address by setting the X-Forwarded-For header. This may allow a user
to bypass IP based restrictions, or obfuscate their true source.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-28483
ghsas:
- GHSA-h395-qcrw-5vmq
credits:
- '@sorenisanerd'
references:
- report: https://github.com/gin-gonic/gin/issues/2862
- report: https://github.com/gin-gonic/gin/issues/2473
- report: https://github.com/gin-gonic/gin/issues/2232
- fix: https://github.com/gin-gonic/gin/pull/2844
- fix: https://github.com/gin-gonic/gin/commit/5929d521715610c9dd14898ebbe1d188d5de8937
- fix: https://github.com/gin-gonic/gin/pull/2632
- fix: https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711
- fix: https://github.com/gin-gonic/gin/pull/2675
- fix: https://github.com/gin-gonic/gin/commit/03e5e05ae089bc989f1ca41841f05504d29e3fd9
- web: https://github.com/gin-gonic/gin/pull/2474
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2716.yaml
|
id: GO-2024-2716
modules:
- module: github.com/authzed/spicedb
versions:
- fixed: 1.30.1
vulnerable_at: 1.30.0
summary: |-
SpiceDB: LookupSubjects may return partial results if a specific kind of
relation is used in github.com/authzed/spicedb
cves:
- CVE-2024-32001
ghsas:
- GHSA-j85q-46hg-36p2
references:
- advisory: https://github.com/authzed/spicedb/security/advisories/GHSA-j85q-46hg-36p2
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32001
- fix: https://github.com/authzed/spicedb/commit/a244ed1edfaf2382711dccdb699971ec97190c7b
- web: https://github.com/authzed/spicedb/releases/tag/v1.30.1
source:
id: GHSA-j85q-46hg-36p2
created: 2024-05-17T16:13:26.196238-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0294.yaml
|
id: GO-2022-0294
modules:
- module: github.com/google/go-attestation
versions:
- fixed: 0.4.0
vulnerable_at: 0.3.2
packages:
- package: github.com/google/go-attestation/attest
symbols:
- AKPublic.validate12Quote
- AKPublic.validate20Quote
derived_symbols:
- AKPublic.Verify
- TPM.AttestPlatform
summary: Improper input validation in github.com/google/go-attestation
description: |-
A local attacker can defeat remotely-attested measured boot.
Improper input validation in AKPublic.Verify can cause it to succeed when
provided with a maliciously-formed Quote over no/some PCRs. Subsequent use of
the same set of PCR values in Eventlog.Verify lacks the authentication performed
by quote verification, meaning a local attacker can couple this vulnerability
with a maliciously-formed TCG log in Eventlog.Verify to spoof events in the TCG
log, defeating remotely-attested measured-boot.
published: 2022-07-15T23:27:21Z
cves:
- CVE-2022-0317
ghsas:
- GHSA-99cg-575x-774p
credits:
- Nikki VonHollen
references:
- fix: https://github.com/google/go-attestation/commit/82f2c9c2c76e1d3691d17ee78116d1d93a123788
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2916.yaml
|
id: GO-2024-2916
modules:
- module: github.com/goharbor/harbor
versions:
- fixed: 2.8.6+incompatible
- introduced: 2.9.0+incompatible
- fixed: 2.9.4+incompatible
- introduced: 2.10.0+incompatible
- fixed: 2.10.2+incompatible
vulnerable_at: 2.10.2-rc1+incompatible
summary: SQL Injection in Harbor scan log API in github.com/goharbor/harbor
cves:
- CVE-2024-22261
ghsas:
- GHSA-vw63-824v-qf2j
references:
- advisory: https://github.com/goharbor/harbor/security/advisories/GHSA-vw63-824v-qf2j
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-22261
source:
id: GHSA-vw63-824v-qf2j
created: 2024-06-13T12:05:42.621716-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2610.yaml
|
id: GO-2024-2610
modules:
- module: std
versions:
- fixed: 1.21.8
- introduced: 1.22.0-0
- fixed: 1.22.1
vulnerable_at: 1.22.0
packages:
- package: html/template
symbols:
- jsValEscaper
- escaper.commit
derived_symbols:
- Template.Execute
- Template.ExecuteTemplate
summary: |-
Errors returned from JSON marshaling may break template escaping in
html/template
description: |-
If errors returned from MarshalJSON methods contain user controlled data, they
may be used to break the contextual auto-escaping behavior of the html/template
package, allowing for subsequent actions to inject unexpected content into
templates.
credits:
- RyotaK (https://ryotak.net)
references:
- report: https://go.dev/issue/65697
- fix: https://go.dev/cl/564196
- web: https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg
cve_metadata:
id: CVE-2024-24785
cwe: 'CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences'
references:
- https://security.netapp.com/advisory/ntap-20240329-0008/
- http://www.openwall.com/lists/oss-security/2024/03/08/4
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0470.yaml
|
id: GO-2022-0470
modules:
- module: github.com/blevesearch/bleve
vulnerable_at: 1.0.14
packages:
- package: github.com/blevesearch/bleve/http
symbols:
- AliasHandler.ServeHTTP
- CreateIndexHandler.ServeHTTP
- DebugDocumentHandler.ServeHTTP
- DeleteIndexHandler.ServeHTTP
- DocCountHandler.ServeHTTP
- DocDeleteHandler.ServeHTTP
- DocGetHandler.ServeHTTP
- DocIndexHandler.ServeHTTP
- GetIndexHandler.ServeHTTP
- ListFieldsHandler.ServeHTTP
- SearchHandler.ServeHTTP
- module: github.com/blevesearch/bleve/v2
vulnerable_at: 2.3.2
packages:
- package: github.com/blevesearch/bleve/v2/http
symbols:
- AliasHandler.ServeHTTP
- CreateIndexHandler.ServeHTTP
- DebugDocumentHandler.ServeHTTP
- DeleteIndexHandler.ServeHTTP
- DocCountHandler.ServeHTTP
- DocDeleteHandler.ServeHTTP
- DocGetHandler.ServeHTTP
- DocIndexHandler.ServeHTTP
- GetIndexHandler.ServeHTTP
- ListFieldsHandler.ServeHTTP
- SearchHandler.ServeHTTP
summary: No access control in github.com/blevesearch/bleve and bleve/v2
description: |-
HTTP handlers provide unauthenticated access to the local filesystem.
The Bleve http package is intended for demonstration purposes and contains no
authentication, authorization, or validation of user inputs. Exposing handlers
from this package can permit attackers to create files and delete directories.
published: 2022-07-15T23:29:55Z
cves:
- CVE-2022-31022
ghsas:
- GHSA-9w9f-6mg8-jp7w
references:
- fix: https://github.com/blevesearch/bleve/commit/1c7509d6a17d36f265c90b4e8f4e3a3182fe79ff
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0972.yaml
|
id: GO-2022-0972
modules:
- module: github.com/shamaton/msgpack/v2
versions:
- fixed: 2.1.1
vulnerable_at: 2.1.0
packages:
- package: github.com/shamaton/msgpack/v2
symbols:
- Unmarshal
summary: Panic in github.com/shamaton/msgpack/v2
description: |-
Unmarshal can panic on some inputs, possibly allowing for denial of service
attacks.
ghsas:
- GHSA-jr77-8gx4-h5qh
credits:
- Red Canary
references:
- report: https://github.com/shamaton/msgpack/issues/31
- fix: https://github.com/shamaton/msgpack/pull/32
cve_metadata:
id: CVE-2022-41719
cwe: 'CWE 400: Uncontrolled Resource Consumption'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2769.yaml
|
id: GO-2024-2769
modules:
- module: code.gitea.io/gitea
versions:
- fixed: 1.16.9
vulnerable_at: 1.16.8
summary: Gitea allowed assignment of private issues in code.gitea.io/gitea
cves:
- CVE-2022-38183
ghsas:
- GHSA-fhv8-m4j4-cww2
unknown_aliases:
- BIT-gitea-2022-38183
references:
- advisory: https://github.com/advisories/GHSA-fhv8-m4j4-cww2
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-38183
- web: https://blog.gitea.io/2022/07/gitea-1.16.9-is-released
- web: https://github.com/go-gitea/gitea/pull/20133
- web: https://github.com/go-gitea/gitea/pull/20196
source:
id: GHSA-fhv8-m4j4-cww2
created: 2024-06-06T16:18:38.02836-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2771.yaml
|
id: GO-2024-2771
modules:
- module: github.com/rancher/rancher
non_go_versions:
- introduced: 2.5.0
- fixed: 2.5.10
vulnerable_at: 1.6.30
summary: |-
Rancher's Steve API Component Improper authorization check allows privilege
escalation in github.com/rancher/rancher
cves:
- CVE-2021-36776
ghsas:
- GHSA-gvh9-xgrq-r8hw
references:
- advisory: https://github.com/advisories/GHSA-gvh9-xgrq-r8hw
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-36776
- web: https://bugzilla.suse.com/show_bug.cgi?id=1189413
source:
id: GHSA-gvh9-xgrq-r8hw
created: 2024-06-04T15:28:43.930948-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2457.yaml
|
id: GO-2024-2457
modules:
- module: github.com/apache/incubator-answer
versions:
- fixed: 1.2.1
vulnerable_at: 1.2.1-RC1
summary: Apache Answer Race Condition vulnerability in github.com/apache/incubator-answer
cves:
- CVE-2023-49619
ghsas:
- GHSA-f899-4mr4-fqpv
references:
- advisory: https://github.com/advisories/GHSA-f899-4mr4-fqpv
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-49619
- web: http://www.openwall.com/lists/oss-security/2024/01/10/1
- web: https://lists.apache.org/thread/nscrl3c7pn68q4j73y3ottql6n5x3hd4
source:
id: GHSA-f899-4mr4-fqpv
created: 2024-06-14T11:35:54.338882-04:00
review_status: UNREVIEWED
unexcluded: NOT_IMPORTABLE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0942.yaml
|
id: GO-2022-0942
modules:
- module: github.com/graphql-go/graphql
versions:
- fixed: 0.8.1
vulnerable_at: 0.8.0
packages:
- package: github.com/graphql-go/graphql/language/parser
symbols:
- Parse
summary: Infinite recursion in parser in github.com/graphql-go/graphql
description: |-
graphql-go (aka GraphQL for Go) has infinite recursion in the type definition
parser.
published: 2022-08-23T13:19:13Z
cves:
- CVE-2022-37315
ghsas:
- GHSA-h3qm-jrrf-cgj3
references:
- fix: https://github.com/graphql-go/graphql/pull/642
- fix: https://github.com/graphql-go/graphql/pull/642/commits/4188bd5b3877f7badb951b421cf66e0af2eacb22
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1175.yaml
|
id: GO-2022-1175
modules:
- module: github.com/cortexproject/cortex
versions:
- introduced: 1.13.0
- fixed: 1.13.2
- introduced: 1.14.0
- fixed: 1.14.1
vulnerable_at: 1.14.0
packages:
- package: github.com/cortexproject/cortex/pkg/alertmanager
symbols:
- validateAlertmanagerConfig
- validateGlobalConfig
skip_fix: 'TODO: Revisit this reason. (Running fix causes error containing undefined: grpc.WithBalancerName)'
summary: Exposure of local files in github.com/cortexproject/cortex
description: |-
A malicious actor could remotely read local files by submitting to the
Alertmanager Set Configuration API maliciously crafted inputs. Only users of the
Alertmanager service where "-experimental.alertmanager.enable-api" or
"enable_api: true" is configured are affected.
cves:
- CVE-2022-23536
ghsas:
- GHSA-cq2g-pw6q-hf7j
credits:
- Austin Robertson with Amazon Web Services
references:
- advisory: https://github.com/cortexproject/cortex/security/advisories/GHSA-cq2g-pw6q-hf7j
- fix: https://github.com/cortexproject/cortex/commit/03e023d8b012887b31cc268d0d011b01e1e65506
- web: https://cortexmetrics.io/docs/api/#set-alertmanager-configuration
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0022.yaml
|
id: GO-2020-0022
modules:
- module: github.com/cloudflare/golz4
versions:
- fixed: 0.0.0-20140711154735-199f5f787806
vulnerable_at: 0.0.0-20140711153818-2dcef6a6aeec
packages:
- package: github.com/cloudflare/golz4
symbols:
- Uncompress
summary: Out-of-bounds write in github.com/cloudflare/golz4
description: |-
LZ4 bindings use a deprecated C API that is vulnerable to memory corruption,
which could lead to arbitrary code execution if called with untrusted user
input.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-4wp2-8rm2-jgmh
credits:
- Yann Collet
references:
- fix: https://github.com/cloudflare/golz4/commit/199f5f7878062ca17a98e079f2dbe1205e2ed898
- web: https://github.com/cloudflare/golz4/issues/5
cve_metadata:
id: CVE-2014-125026
cwe: 'CWE 94: Improper Control of Generation of Code (''Code Injection'')'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2554.yaml
|
id: GO-2024-2554
modules:
- module: helm.sh/helm/v3
versions:
- fixed: 3.14.1
vulnerable_at: 3.14.0
packages:
- package: helm.sh/helm/v3/pkg/chart
symbols:
- Metadata.Validate
derived_symbols:
- Chart.Validate
- package: helm.sh/helm/v3/pkg/chartutil
symbols:
- SaveDir
- writeTarContents
derived_symbols:
- CreateFrom
- Save
- package: helm.sh/helm/v3/pkg/lint/rules
symbols:
- validateChartName
derived_symbols:
- Chartfile
- Dependencies
- Templates
- TemplatesWithKubeVersion
summary: Path traversal in helm.sh/helm/v3
cves:
- CVE-2024-25620
ghsas:
- GHSA-v53g-5gjp-272r
references:
- advisory: https://github.com/helm/helm/security/advisories/GHSA-v53g-5gjp-272r
- fix: https://github.com/helm/helm/commit/0d0f91d1ce277b2c8766cdc4c7aa04dbafbf2503
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0014.yaml
|
id: GO-2020-0014
modules:
- module: golang.org/x/net
versions:
- fixed: 0.0.0-20190125091013-d26f9f9a57f3
vulnerable_at: 0.0.0-20190125002852-4b62a64f59f7
packages:
- package: golang.org/x/net/html
symbols:
- inSelectIM
- inSelectInTableIM
derived_symbols:
- Parse
- ParseFragment
summary: Infinite loop due to improper handling of "select" tags in golang.org/x/net/html
description: |-
html.Parse does not properly handle "select" tags, which can lead to an infinite
loop. If parsing user supplied input, this may be used as a denial of service
vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2018-17846
ghsas:
- GHSA-vfw5-hrgq-h5wf
credits:
- '@tr3ee'
references:
- fix: https://go-review.googlesource.com/c/137275
- fix: https://go.googlesource.com/net/+/d26f9f9a57f3fab6a695bec0d84433c2c50f8bbf
- report: https://go.dev/issue/27842
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0289.yaml
|
id: GO-2022-0289
modules:
- module: std
versions:
- fixed: 1.16.12
- introduced: 1.17.0-0
- fixed: 1.17.5
vulnerable_at: 1.17.4
packages:
- package: syscall
symbols:
- ForkExec
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Misdirected I/O in syscall
description: |-
When a Go program running on a Unix system is out of file descriptors and calls
syscall.ForkExec (including indirectly by using the os/exec package),
syscall.ForkExec can close file descriptor 0 as it fails. If this happens (or
can be provoked) repeatedly, it can result in misdirected I/O such as writing
network traffic intended for one connection to a different connection, or
content intended for one file to a different one.
For users who cannot immediately update to the new release, the bug can be
mitigated by raising the per-process file descriptor limit.
published: 2022-05-18T18:23:23Z
cves:
- CVE-2021-44717
credits:
- Tomasz Maczukin
- Kamil Trzciński of GitLab
references:
- fix: https://go.dev/cl/370576
- fix: https://go.googlesource.com/go/+/a76511f3a40ea69ee4f5cd86e735e1c8a84f0aa2
- report: https://go.dev/issue/50057
- web: https://groups.google.com/g/golang-announce/c/hcmEScgc00k
- fix: https://go.dev/cl/370577
- fix: https://go.dev/cl/370795
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2747.yaml
|
id: GO-2024-2747
modules:
- module: github.com/gohugoio/hugo
versions:
- introduced: 0.123.0
- fixed: 0.125.3
vulnerable_at: 0.125.2
packages:
- package: github.com/gohugoio/hugo/hugolib
summary: Hugo Markdown titles are not escaped in internal render hooks in github.com/gohugoio/hugo
cves:
- CVE-2024-32875
ghsas:
- GHSA-ppf8-hhpp-f5hj
references:
- advisory: https://github.com/gohugoio/hugo/security/advisories/GHSA-ppf8-hhpp-f5hj
- fix: https://github.com/gohugoio/hugo/commit/15a4b9b33715887001f6eff30721d41c0d4cfdd1
- web: https://github.com/gohugoio/hugo/releases/tag/v0.125.3
- web: https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault
source:
id: GHSA-ppf8-hhpp-f5hj
created: 2024-07-16T11:10:41.124714-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0073.yaml
|
id: GO-2021-0073
modules:
- module: github.com/git-lfs/git-lfs
versions:
- fixed: 2.1.1-0.20170519163204-f913f5f9c7c6+incompatible
vulnerable_at: 2.1.0+incompatible
packages:
- package: github.com/git-lfs/git-lfs/lfsapi
symbols:
- sshGetLFSExeAndArgs
derived_symbols:
- Client.NewRequest
- sshAuthClient.Resolve
- sshCache.Resolve
summary: Arbitrary command execution in github.com/git-lfs/git-lfs
description: |-
Arbitrary command execution can be triggered by improperly sanitized SSH URLs in
LFS configuration files. This can be triggered by cloning a malicious
repository.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2017-17831
ghsas:
- GHSA-w4xh-w33p-4v29
references:
- fix: https://github.com/git-lfs/git-lfs/pull/2241
- fix: https://github.com/git-lfs/git-lfs/commit/f913f5f9c7c6d1301785fdf9884a2942d59cdf19
- web: http://blog.recurity-labs.com/2017-08-10/scm-vulns
- web: https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2870.yaml
|
id: GO-2024-2870
modules:
- module: github.com/aquasecurity/trivy
versions:
- fixed: 0.51.2
vulnerable_at: 0.51.1
packages:
- package: github.com/aquasecurity/trivy/pkg/fanal/image/registry/azure
- package: github.com/aquasecurity/trivy/pkg/fanal/image/registry/ecr
symbols:
- ECR.CheckOptions
- package: github.com/aquasecurity/trivy/pkg/fanal/image/registry/google
symbols:
- Registry.CheckOptions
summary: Credential leakage in github.com/aquasecurity/trivy
description: |-
A malicious registry can cause Trivy to leak credentials for legitimate
registries such as AWS Elastic Container Registry (ECR), Google Cloud
Artifact/Container Registry, or Azure Container Registry (ACR) if the registry
is scanned from directly using Trivy. These tokens can then be used to push/pull
images from those registries to which the identity/user running Trivy has
access. This vulnerability only applies when scanning container images directly
from a registry. If you use Docker, containerd or other runtime to pull images
locally and scan them with Trivy, you are not affected. To enforce this
behavior, you can use the --image-src flag to select which sources you trust.
cves:
- CVE-2024-35192
ghsas:
- GHSA-xcq4-m2r3-cmrj
credits:
- '@lyoung-confluent'
references:
- advisory: https://github.com/aquasecurity/trivy/security/advisories/GHSA-xcq4-m2r3-cmrj
- fix: https://github.com/aquasecurity/trivy/commit/e7f14f729de259551203f313e57d2d9d3aa2ff87
source:
id: GHSA-xcq4-m2r3-cmrj
created: 2024-05-22T14:41:45.135631743Z
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2907.yaml
|
id: GO-2024-2907
modules:
- module: github.com/projectdiscovery/interactsh
versions:
- fixed: 1.2.0
vulnerable_at: 1.1.9
summary: Files or Directories Accessible to External Parties in ProjectDiscovery in github.com/projectdiscovery/interactsh
cves:
- CVE-2024-5262
ghsas:
- GHSA-q5mg-pc7r-r8cr
references:
- advisory: https://github.com/advisories/GHSA-q5mg-pc7r-r8cr
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-5262
- fix: https://github.com/projectdiscovery/interactsh/commit/6a0cb98b16636a98712729f3d23e34d8bf7260e7
- fix: https://github.com/projectdiscovery/interactsh/pull/874
- web: https://zuso.ai/advisory/za-2024-01
source:
id: GHSA-q5mg-pc7r-r8cr
created: 2024-06-13T12:06:00.68454-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0643.yaml
|
id: GO-2022-0643
modules:
- module: github.com/elastic/beats
versions:
- fixed: 6.1.0+incompatible
vulnerable_at: 6.0.0
packages:
- package: github.com/elastic/beats/packetbeat/protos/pgsql
symbols:
- pgsqlFieldsParser
derived_symbols:
- pgsqlPlugin.Parse
summary: Denial of service in github.com/elastic/beats
description: |-
A local attacker can cause a panic if they are able to send arbitrary traffic to
a monitored port, due to an out of bounds read.
published: 2022-02-15T01:57:18Z
cves:
- CVE-2017-11480
ghsas:
- GHSA-9q3g-m353-cp4p
references:
- fix: https://github.com/elastic/beats/pull/5457
- fix: https://github.com/elastic/beats/commit/aeca65779d573976981587ca1d1461399e1b59dd
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0113.yaml
|
id: GO-2021-0113
modules:
- module: golang.org/x/text
versions:
- fixed: 0.3.7
vulnerable_at: 0.3.6
packages:
- package: golang.org/x/text/language
symbols:
- Parse
derived_symbols:
- MatchStrings
- MustParse
- ParseAcceptLanguage
summary: Out-of-bounds read in golang.org/x/text/language
description: |-
Due to improper index calculation, an incorrectly formatted language tag can
cause Parse to panic via an out of bounds read. If Parse is used to process
untrusted user inputs, this may be used as a vector for a denial of service
attack.
published: 2021-10-06T17:51:21Z
cves:
- CVE-2021-38561
ghsas:
- GHSA-ppp9-7jff-5vj2
credits:
- Guido Vranken
references:
- fix: https://go.dev/cl/340830
- fix: https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2891.yaml
|
id: GO-2024-2891
modules:
- module: github.com/evmos/evmos
vulnerable_at: 1.1.3
- module: github.com/evmos/evmos/v2
vulnerable_at: 2.0.2
- module: github.com/evmos/evmos/v3
vulnerable_at: 3.0.3
- module: github.com/evmos/evmos/v4
vulnerable_at: 4.0.2
- module: github.com/evmos/evmos/v5
vulnerable_at: 5.0.1
- module: github.com/evmos/evmos/v6
vulnerable_at: 6.0.4
- module: github.com/evmos/evmos/v7
vulnerable_at: 7.0.0
- module: github.com/evmos/evmos/v8
vulnerable_at: 8.2.3
- module: github.com/evmos/evmos/v9
vulnerable_at: 9.1.0
- module: github.com/evmos/evmos/v10
vulnerable_at: 10.0.1
- module: github.com/evmos/evmos/v11
vulnerable_at: 11.0.2
- module: github.com/evmos/evmos/v12
vulnerable_at: 12.1.6
- module: github.com/evmos/evmos/v13
vulnerable_at: 13.0.2
- module: github.com/evmos/evmos/v14
vulnerable_at: 14.1.0
- module: github.com/evmos/evmos/v15
vulnerable_at: 15.0.0
- module: github.com/evmos/evmos/v16
vulnerable_at: 16.0.4
- module: github.com/evmos/evmos/v17
vulnerable_at: 17.0.1
- module: github.com/evmos/evmos/v18
versions:
- fixed: 18.0.0
summary: evmos allows transferring unvested tokens after delegations in github.com/evmos/evmos
cves:
- CVE-2024-32873
ghsas:
- GHSA-pxv8-qhrh-jc7v
related:
- CVE-2024-37158
- CVE-2024-37159
references:
- advisory: https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32873
- fix: https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb
notes:
- fix: 'github.com/evmos/evmos/v18: could not add vulnerable_at: could not find tagged version between introduced and fixed'
- manually moved CVE-2024-37158 and CVE-2024-37159 to related section
source:
id: GHSA-pxv8-qhrh-jc7v
created: 2024-06-26T14:08:33.882317-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2098.yaml
|
id: GO-2023-2098
modules:
- module: github.com/consensys/gnark
versions:
- fixed: 0.9.0
vulnerable_at: 0.9.0-alpha
packages:
- package: github.com/consensys/gnark/frontend/cs/r1cs
symbols:
- builder.Cmp
- builder.AssertIsLessOrEqual
- builder.mustBeLessOrEqVar
- builder.mustBeLessOrEqCst
derived_symbols:
- builder.ToBinary
- package: github.com/consensys/gnark/frontend/cs/scs
symbols:
- builder.Cmp
- builder.AssertIsLessOrEqual
- builder.mustBeLessOrEqVar
- builder.mustBeLessOrEqCst
derived_symbols:
- builder.ToBinary
- package: github.com/consensys/gnark/internal/backend/circuits
symbols:
- recursiveHint.Define
- package: github.com/consensys/gnark/std/math/bits
symbols:
- WithNbDigits
summary: |-
Unsoundness in variable comparison / non-unique binary decomposition in
github.com/consensys/gnark
cves:
- CVE-2023-44378
ghsas:
- GHSA-498w-5j49-vqjg
credits:
- '@kustosz'
references:
- report: https://github.com/zkopru-network/zkopru/issues/116
- fix: https://github.com/Consensys/gnark/pull/835
- fix: https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f
- advisory: https://github.com/advisories/GHSA-498w-5j49-vqjg
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2778.yaml
|
id: GO-2024-2778
modules:
- module: github.com/rancher/rancher
versions:
- introduced: 2.0.0+incompatible
non_go_versions:
- fixed: 2.4.16
- introduced: 2.5.0
- fixed: 2.5.9
summary: Rancher Privilege escalation vulnerability via malicious "Connection" header in github.com/rancher/rancher
cves:
- CVE-2021-31999
ghsas:
- GHSA-pvxj-25m6-7vqr
references:
- advisory: https://github.com/advisories/GHSA-pvxj-25m6-7vqr
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-31999
- web: https://bugzilla.suse.com/show_bug.cgi?id=1187084
notes:
- fix: 'github.com/rancher/rancher: could not add vulnerable_at: latest version (1.6.30) is before last introduced version'
source:
id: GHSA-pvxj-25m6-7vqr
created: 2024-06-26T14:03:57.874413-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2756.yaml
|
id: GO-2024-2756
modules:
- module: kubevirt.io/kubevirt
versions:
- fixed: 0.30.0
vulnerable_at: 0.30.0-rc.4
summary: Privilege Escalation in kubevirt in kubevirt.io/kubevirt
cves:
- CVE-2020-14316
ghsas:
- GHSA-828r-r2c8-rfw3
references:
- advisory: https://github.com/advisories/GHSA-828r-r2c8-rfw3
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-14316
- web: https://bugzilla.redhat.com/show_bug.cgi?id=1848951
- web: https://github.com/kubevirt/kubevirt/pull/3686
source:
id: GHSA-828r-r2c8-rfw3
created: 2024-05-17T16:12:17.184908-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0969.yaml
|
id: GO-2022-0969
modules:
- module: std
versions:
- fixed: 1.18.6
- introduced: 1.19.0-0
- fixed: 1.19.1
vulnerable_at: 1.19.0
packages:
- package: net/http
symbols:
- http2serverConn.goAway
derived_symbols:
- ListenAndServe
- ListenAndServeTLS
- Serve
- ServeTLS
- Server.ListenAndServe
- Server.ListenAndServeTLS
- Server.Serve
- Server.ServeTLS
- http2Server.ServeConn
- module: golang.org/x/net
versions:
- fixed: 0.0.0-20220906165146-f3363e06e74c
vulnerable_at: 0.0.0-20220826154423-83b083e8dc8b
packages:
- package: golang.org/x/net/http2
symbols:
- serverConn.goAway
derived_symbols:
- Server.ServeConn
summary: Denial of service in net/http and golang.org/x/net/http2
description: |-
HTTP/2 server connections can hang forever waiting for a clean shutdown that was
preempted by a fatal error. This condition can be exploited by a malicious
client to cause a denial of service.
published: 2022-09-12T20:23:06Z
cves:
- CVE-2022-27664
ghsas:
- GHSA-69cg-p879-7622
credits:
- Bahruz Jabiyev
- Tommaso Innocenti
- Anthony Gavazzi
- Steven Sprecher
- Kaan Onarlioglu
references:
- web: https://groups.google.com/g/golang-announce/c/x49AQzIVX-s
- report: https://go.dev/issue/54658
- fix: https://go.dev/cl/428735
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1557.yaml
|
id: GO-2023-1557
modules:
- module: github.com/ipfs/go-unixfs
versions:
- fixed: 0.4.3
vulnerable_at: 0.4.2
packages:
- package: github.com/ipfs/go-unixfs/hamt
symbols:
- makeShard
- newChilder
derived_symbols:
- NewHamtFromDag
- NewShard
- NewShardValue
- Shard.EnumLinks
- Shard.EnumLinksAsync
- Shard.Find
- Shard.ForEachLink
- Shard.Remove
- Shard.Set
- Shard.SetLink
- Shard.Swap
- Shard.Take
summary: Denial of service via HAMT decoding panic in github.com/ipfs/go-unixfs
description: |-
Trying to read malformed HAMT sharded directories can cause panics and virtual
memory leaks. If you are reading untrusted user input, an attacker can then
trigger a panic.
This is caused by bogus "fanout" parameter in the HAMT directory nodes. A
workaround is to not feed untrusted user data to the decoding functions.
cves:
- CVE-2023-23625
ghsas:
- GHSA-q264-w97q-q778
credits:
- Jorropo
references:
- advisory: https://github.com/advisories/GHSA-q264-w97q-q778
- fix: https://github.com/ipfs/go-unixfs/commit/467d139a640ecee4f2e74643dafcc58bb3b54175
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0264.yaml
|
id: GO-2021-0264
modules:
- module: std
versions:
- fixed: 1.16.10
- introduced: 1.17.0-0
- fixed: 1.17.3
vulnerable_at: 1.17.2
packages:
- package: archive/zip
symbols:
- split
- Reader.Open
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Panic when opening certain archives in archive/zip
description: |-
Previously, opening a zip with (*Reader).Open could result in a panic if the zip
contained a file whose name was exclusively made up of slash characters or ".."
path elements.
Open could also panic if passed the empty string directly as an argument.
Now, any files in the zip whose name could not be made valid for fs.FS.Open will
be skipped, and no longer added to the fs.FS file list, although they are still
accessible through (*Reader).File.
Note that it was already the case that a file could be accessible from
(*Reader).Open with a name different from the one in (*Reader).File, as the
former is the cleaned name, while the latter is the original one.
Finally, the actual panic site was made robust as a defense-in-depth measure.
published: 2022-01-13T20:54:43Z
cves:
- CVE-2021-41772
credits:
- Colin Arnott (SiteHost)
- Noah Santschi-Cooney (Sourcegraph Code Intelligence Team)
references:
- fix: https://go.dev/cl/349770
- fix: https://go.googlesource.com/go/+/b24687394b55a93449e2be4e6892ead58ea9a10f
- web: https://groups.google.com/g/golang-announce/c/0fM21h43arc
- report: https://go.dev/issue/48085
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1130.yaml
|
id: GO-2022-1130
modules:
- module: github.com/prometheus/exporter-toolkit
versions:
- fixed: 0.7.2
- introduced: 0.8.0
- fixed: 0.8.2
vulnerable_at: 0.8.1
packages:
- package: github.com/prometheus/exporter-toolkit/web
symbols:
- webHandler.ServeHTTP
derived_symbols:
- Listen
- ListenAndServe
- Serve
- ServeMultiple
summary: Authentication bypass in github.com/prometheus/exporter-toolkit
description: |-
If an attacker has access to a Prometheus web.yml file and users' bcrypted
passwords, it would be possible to bypass security via the built-in
authentication cache.
cves:
- CVE-2022-46146
ghsas:
- GHSA-7rg2-cxvp-9p7p
credits:
- Lei Wan
references:
- advisory: https://github.com/prometheus/exporter-toolkit/security/advisories/GHSA-7rg2-cxvp-9p7p
- fix: https://github.com/prometheus/exporter-toolkit/commit/5b1eab34484ddd353986bce736cd119d863e4ff5
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1840.yaml
|
id: GO-2023-1840
modules:
- module: std
versions:
- fixed: 1.19.10
- introduced: 1.20.0-0
- fixed: 1.20.5
vulnerable_at: 1.20.4
packages:
- package: runtime
summary: Unsafe behavior in setuid/setgid binaries in runtime
description: |-
On Unix platforms, the Go runtime does not behave differently when a binary is
run with the setuid/setgid bits. This can be dangerous in certain cases, such as
when dumping memory state, or assuming the status of standard i/o file
descriptors.
If a setuid/setgid binary is executed with standard I/O file descriptors closed,
opening any files can result in unexpected content being read or written with
elevated privileges. Similarly, if a setuid/setgid program is terminated, either
via panic or signal, it may leak the contents of its registers.
credits:
- Vincent Dehors from Synacktiv
references:
- report: https://go.dev/issue/60272
- fix: https://go.dev/cl/501223
- web: https://groups.google.com/g/golang-announce/c/q5135a9d924/m/j0ZoAJOHAwAJ
cve_metadata:
id: CVE-2023-29403
cwe: 'CWE-642: External Control of Critical State Data'
references:
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBS3IIK6ADV24C5ULQU55QLT2UE762ZX/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZ2O6YCO2IZMZJELQGZYR2WAUNEDLYV6/
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0034.yaml
|
id: GO-2020-0034
modules:
- module: github.com/artdarek/go-unzip
versions:
- fixed: 1.0.0
vulnerable_at: 0.0.0-20180315101617-33dc05190e4b
packages:
- package: github.com/artdarek/go-unzip
symbols:
- Unzip.Extract
summary: Path traversal in github.com/artdarek/go-unzip
description: |-
Due to improper path sanitization, archives containing relative file paths can
cause files to be written (or overwritten) outside of the target directory.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-rmj9-q58g-9qgg
references:
- fix: https://github.com/artdarek/go-unzip/pull/2
- fix: https://github.com/artdarek/go-unzip/commit/4975cbe0a719dc50b12da8585f1f207c82f7dfe0
- web: https://snyk.io/research/zip-slip-vulnerability
cve_metadata:
id: CVE-2020-36560
cwe: 'CWE 29: Path Traversal: "\..\filename"'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0533.yaml
|
id: GO-2022-0533
modules:
- module: std
versions:
- fixed: 1.17.11
- introduced: 1.18.0-0
- fixed: 1.18.3
vulnerable_at: 1.18.2
packages:
- package: path/filepath
goos:
- windows
symbols:
- Clean
summary: Path traversal via Clean on Windows in path/filepath
description: |-
On Windows, the filepath.Clean function can convert certain invalid paths to
valid, absolute paths, potentially allowing a directory traversal attack.
For example, Clean(".\c:") returns "c:".
published: 2022-07-28T17:25:07Z
credits:
- Unrud
references:
- fix: https://go.dev/cl/401595
- fix: https://go.googlesource.com/go/+/9cd1818a7d019c02fa4898b3e45a323e35033290
- report: https://go.dev/issue/52476
- web: https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
cve_metadata:
id: CVE-2022-29804
cwe: 'CWE-22: Improper Limitation of a Pathname to a Restricted Directory (''Path Traversal'')'
description: |-
Incorrect conversion of certain invalid paths to valid, absolute paths in Clean
in path/filepath before Go 1.17.11 and Go 1.18.3 on Windows allows potential
directory traversal attack.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2866.yaml
|
id: GO-2024-2866
modules:
- module: github.com/submariner-io/submariner-operator
versions:
- fixed: 0.16.4
- introduced: 0.17.0
unsupported_versions:
- last_affected: 0.18.0-m3
vulnerable_at: 0.17.1
summary: Submariner Operator sets unnecessary RBAC permissions in helm charts in github.com/submariner-io/submariner-operator
cves:
- CVE-2024-5042
ghsas:
- GHSA-2rhx-qhxp-5jpw
references:
- advisory: https://github.com/advisories/GHSA-2rhx-qhxp-5jpw
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-5042
- fix: https://github.com/submariner-io/submariner-operator/commit/b27a04c4270e53cbff6ff8ac6245db10c204bcab
- fix: https://github.com/submariner-io/submariner-operator/pull/3040
- report: https://github.com/submariner-io/submariner-operator/issues/3041
- web: https://access.redhat.com/security/cve/CVE-2024-5042
- web: https://bugzilla.redhat.com/show_bug.cgi?id=2280921
source:
id: GHSA-2rhx-qhxp-5jpw
created: 2024-06-04T14:26:43.671356-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1574.yaml
|
id: GO-2023-1574
modules:
- module: github.com/containerd/containerd
versions:
- introduced: 1.6.0
- fixed: 1.6.18
vulnerable_at: 1.6.17
packages:
- package: github.com/containerd/containerd/oci
symbols:
- WithUser
- WithUIDGID
- WithUserID
- WithUsername
- WithAdditionalGIDs
- package: github.com/containerd/containerd/pkg/cri/server
symbols:
- criService.containerSpecOpts
derived_symbols:
- criService.CreateContainer
- instrumentedAlphaService.CreateContainer
- instrumentedService.CreateContainer
- module: github.com/containerd/containerd
versions:
- fixed: 1.5.18
vulnerable_at: 1.5.17
packages:
- package: github.com/containerd/containerd/oci
symbols:
- WithUser
- WithUIDGID
- WithUserID
- WithUsername
- WithAdditionalGIDs
- package: github.com/containerd/containerd/pkg/cri/server
symbols:
- criService.containerSpecOpts
derived_symbols:
- criService.CreateContainer
- instrumentedService.CreateContainer
summary: |-
Privilege escalation via supplementary groups in
github.com/containerd/containerd
description: |-
Supplementary groups are not set up properly inside a container. If an attacker
has direct access to a container and manipulates their supplementary group
access, they may be able to use supplementary group access to bypass primary
group restrictions in some cases and potentially escalate privileges in the
container. Uses of the containerd client library may also have improperly setup
supplementary groups.
cves:
- CVE-2023-25173
ghsas:
- GHSA-hmfx-3pcx-653p
related:
- GHSA-4wjj-jwc9-2x96
- GHSA-fjm8-m7m6-2fjp
- GHSA-phjr-8j92-w5v7
- GHSA-rc4r-wh2q-q6c4
- CVE-2022-2989
- CVE-2022-2990
- CVE-2022-2995
- CVE-2022-36109
references:
- advisory: https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
- web: https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4
- fix: https://github.com/containerd/containerd/commit/133f6bb6cd827ce35a5fb279c1ead12b9d21460a
- web: https://github.com/advisories/GHSA-4wjj-jwc9-2x96
- web: https://github.com/advisories/GHSA-fjm8-m7m6-2fjp
- web: https://github.com/advisories/GHSA-phjr-8j92-w5v7
- article: https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2590.yaml
|
id: GO-2024-2590
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 9.2.0+incompatible
- fixed: 9.2.5+incompatible
- introduced: 9.3.0+incompatible
- fixed: 9.3.1+incompatible
- introduced: 9.4.0+incompatible
- fixed: 9.4.2+incompatible
vulnerable_at: 9.4.2-rc2+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- fixed: 8.1.9
vulnerable_at: 8.0.0-20240626184126-817e18414e41
summary: Mattermost leaks details of AD/LDAP groups of a teams in github.com/mattermost/mattermost-server
cves:
- CVE-2024-23493
ghsas:
- GHSA-7v3v-984v-h74r
unknown_aliases:
- CGA-gvhx-fgcw-f546
references:
- advisory: https://github.com/advisories/GHSA-7v3v-984v-h74r
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23493
- web: https://mattermost.com/security-updates
source:
id: GHSA-7v3v-984v-h74r
created: 2024-06-26T16:06:07.408556-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2521.yaml
|
id: GO-2024-2521
modules:
- module: github.com/docker/docker
versions:
- fixed: 20.10.0-beta1+incompatible
non_go_versions:
- introduced: 19.03.0
- fixed: 19.03.1
packages:
- package: github.com/docker/docker/pkg/chrootarchive
skip_fix: fix does not work with incompatible versions
- module: github.com/moby/moby
versions:
- fixed: 20.10.0-beta1+incompatible
non_go_versions:
- introduced: 19.03.0
- fixed: 19.03.1
packages:
- package: github.com/moby/moby/pkg/chrootarchive
skip_fix: fix does not work with incompatible versions
summary: Moby Docker cp broken with debian containers in github.com/docker/docker
description: |-
In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc),
code injection can occur when the nsswitch facility dynamically loads a library
inside a chroot that contains the contents of the container.
cves:
- CVE-2019-14271
ghsas:
- GHSA-v2cv-wwxq-qq97
references:
- advisory: https://github.com/advisories/GHSA-v2cv-wwxq-qq97
- fix: https://github.com/moby/moby/commit/11e48badcb67554b3d795241855028f28d244545
- fix: https://github.com/moby/moby/commit/fa8dd90ceb7bcb9d554d27e0b9087ab83e54bd2b
- fix: https://github.com/moby/moby/pull/39612
- report: https://github.com/moby/moby/issues/39449
source:
id: GHSA-v2cv-wwxq-qq97
created: 2024-07-15T12:29:37.368794-04:00
review_status: REVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2844.yaml
|
id: GO-2024-2844
modules:
- module: github.com/grafana/grafana
non_go_versions:
- fixed: 8.5.15
- introduced: 9.0.0
- fixed: 9.2.4
vulnerable_at: 5.4.5+incompatible
summary: Grafana User enumeration via forget password in github.com/grafana/grafana
cves:
- CVE-2022-39307
ghsas:
- GHSA-3p62-42x7-gxg5
unknown_aliases:
- BIT-grafana-2022-39307
references:
- advisory: https://github.com/grafana/grafana/security/advisories/GHSA-3p62-42x7-gxg5
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-39307
- web: https://security.netapp.com/advisory/ntap-20221215-0004
source:
id: GHSA-3p62-42x7-gxg5
created: 2024-06-04T14:27:37.274881-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2809.yaml
|
id: GO-2024-2809
modules:
- module: github.com/carina-io/carina
vulnerable_at: 0.13.0
summary: CVE-2024-32359 in github.com/carina-io/carina
cves:
- CVE-2024-32359
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-32359
- web: http://carina.com
- web: https://gist.github.com/HouqiyuA/568d9857dab4ddba6b8b6a791e90f906
- web: https://github.com/HouqiyuA/k8s-rbac-poc
- web: https://github.com/carina-io/carina
source:
id: CVE-2024-32359
created: 2024-06-04T15:26:08.181182-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2496.yaml
|
id: GO-2024-2496
modules:
- module: github.com/apache/servicecomb-service-center
non_go_versions:
- fixed: 2.2.0
vulnerable_at: 1.4.8
summary: |-
Apache ServiceComb Service-Center Exposure of Sensitive Information to an
Unauthorized Actor vulnerability in github.com/apache/servicecomb-service-center
cves:
- CVE-2023-44312
ghsas:
- GHSA-r8xp-52mq-rmm8
references:
- advisory: https://github.com/advisories/GHSA-r8xp-52mq-rmm8
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-44312
- web: http://www.openwall.com/lists/oss-security/2024/01/31/5
- web: https://lists.apache.org/thread/dkvlgnrmc17qzjdy9k0cr60wpzcssk1s
source:
id: GHSA-r8xp-52mq-rmm8
created: 2024-06-14T11:38:00.285197-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2971.yaml
|
id: GO-2024-2971
modules:
- module: github.com/gogs/gogs
unsupported_versions:
- last_affected: 0.13.0
vulnerable_at: 0.13.0
summary: Gogs allows argument injection during the previewing of changes in github.com/gogs/gogs
cves:
- CVE-2024-39932
ghsas:
- GHSA-hf29-9hfh-w63j
references:
- advisory: https://github.com/advisories/GHSA-hf29-9hfh-w63j
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39932
- web: https://github.com/gogs/gogs/releases
- web: https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1
source:
id: GHSA-hf29-9hfh-w63j
created: 2024-07-08T13:24:05.043922-04:00
review_status: UNREVIEWED
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.