repo_id
stringclasses 927
values | file_path
stringlengths 99
214
| content
stringlengths 2
4.15M
|
|---|---|---|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0411.yaml
|
id: GO-2022-0411
modules:
- module: github.com/Masterminds/goutils
versions:
- fixed: 1.1.1
vulnerable_at: 1.1.0
packages:
- package: github.com/Masterminds/goutils
symbols:
- RandomAlphaNumeric
- CryptoRandomAlphaNumeric
summary: Insufficient randomness in github.com/Masterminds/goutils
description: |-
Randomly-generated alphanumeric strings contain significantly less entropy than
expected.
The RandomAlphaNumeric and CryptoRandomAlphaNumeric functions always return
strings containing at least one digit from 0 to 9. This significantly reduces
the amount of entropy in short strings generated by these functions.
published: 2022-07-01T20:08:24Z
ghsas:
- GHSA-3839-6r69-m497
- GHSA-xg2h-wx96-xgxr
references:
- fix: https://github.com/Masterminds/goutils/commit/869801f20f9f1e7ecdbdb6422049d8241270d5e1
cve_metadata:
id: CVE-2021-4238
cwe: 'CWE 330: Use of Insufficiently Random Values'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2568.yaml
|
id: GO-2024-2568
modules:
- module: github.com/cilium/cilium
versions:
- fixed: 1.14.7
vulnerable_at: 1.14.6
summary: Unencrypted ingress/health traffic when using Wireguard transparent encryption in github.com/cilium/cilium
cves:
- CVE-2024-25630
ghsas:
- GHSA-7496-fgv9-xw82
unknown_aliases:
- BIT-cilium-2024-25630
- BIT-cilium-operator-2024-25630
- BIT-hubble-2024-25630
- BIT-hubble-relay-2024-25630
references:
- advisory: https://github.com/cilium/cilium/security/advisories/GHSA-7496-fgv9-xw82
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-25630
- web: https://docs.cilium.io/en/stable/security/network/encryption-wireguard/#encryption-wg
- web: https://github.com/cilium/cilium/releases/tag/v1.14.7
source:
id: GHSA-7496-fgv9-xw82
created: 2024-06-05T13:39:06.463153-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0317.yaml
|
id: GO-2021-0317
modules:
- module: std
versions:
- fixed: 1.16.14
- introduced: 1.17.0-0
- fixed: 1.17.7
vulnerable_at: 1.17.6
packages:
- package: math/big
symbols:
- Rat.SetString
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Uncontrolled memory consumption in math/big
description: |-
Rat.SetString had an overflow issue that can lead to uncontrolled memory
consumption.
published: 2022-05-23T22:15:42Z
cves:
- CVE-2022-23772
credits:
- Emmanuel Odeke
references:
- fix: https://go.dev/cl/379537
- fix: https://go.googlesource.com/go/+/ad345c265916bbf6c646865e4642eafce6d39e78
- web: https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ
- report: https://go.dev/issue/50699
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1621.yaml
|
id: GO-2023-1621
modules:
- module: std
versions:
- fixed: 1.19.7
- introduced: 1.20.0-0
- fixed: 1.20.2
vulnerable_at: 1.20.1
packages:
- package: crypto/internal/nistec
symbols:
- P256Point.ScalarBaseMult
- P256Point.ScalarMult
- P256OrdInverse
summary: Incorrect calculation on P256 curves in crypto/internal/nistec
description: |-
The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an
incorrect result if called with some specific unreduced scalars (a scalar larger
than the order of the curve).
This does not impact usages of crypto/ecdsa or crypto/ecdh.
credits:
- Guido Vranken, via the Ethereum Foundation bug bounty program
references:
- report: https://go.dev/issue/58647
- fix: https://go.dev/cl/471255
- web: https://groups.google.com/g/golang-announce/c/3-TpUx48iQY
cve_metadata:
id: CVE-2023-24532
cwe: 'CWE-682: Incorrect Calculation'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2853.yaml
|
id: GO-2024-2853
modules:
- module: github.com/tg123/sshpiper
versions:
- introduced: 1.0.50
- fixed: 1.3.0
vulnerable_at: 1.2.8
summary: |-
sshpiper's enabling of proxy protocol without proper feature flagging allows
faking source address in github.com/tg123/sshpiper
cves:
- CVE-2024-35175
ghsas:
- GHSA-4w53-6jvp-gg52
references:
- advisory: https://github.com/tg123/sshpiper/security/advisories/GHSA-4w53-6jvp-gg52
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-35175
- fix: https://github.com/tg123/sshpiper/commit/2ddd69876a1e1119059debc59fe869cb4e754430
- fix: https://github.com/tg123/sshpiper/commit/70fb830dca26bea7ced772ce5d834a3e88ae7f53
source:
id: GHSA-4w53-6jvp-gg52
created: 2024-05-17T16:09:07.811118-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0078.yaml
|
id: GO-2021-0078
modules:
- module: golang.org/x/net
versions:
- fixed: 0.0.0-20180816102801-aaf60122140d
vulnerable_at: 0.0.0-20180811021610-c39426892332
packages:
- package: golang.org/x/net/html
symbols:
- inBodyIM
- inFramesetIM
derived_symbols:
- Parse
- ParseFragment
summary: Panic when parsing malformed HTML in golang.org/x/net/html
description: |-
The HTML parser does not properly handle "in frameset" insertion mode, and can
be made to panic when operating on malformed HTML that contains <template> tags.
If operating on user input, this may be a vector for a denial of service attack.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2018-17075
ghsas:
- GHSA-5p4h-3377-7w67
credits:
- Kunpei Sakai
references:
- fix: https://go.dev/cl/123776
- fix: https://go.googlesource.com/net/+/aaf60122140d3fcf75376d319f0554393160eb50
- report: https://go.dev/issue/27016
- web: https://bugs.chromium.org/p/chromium/issues/detail?id=829668
- web: https://go-review.googlesource.com/c/net/+/94838/9/html/parse.go#1906
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0477.yaml
|
id: GO-2022-0477
modules:
- module: std
versions:
- fixed: 1.17.11
- introduced: 1.18.0-0
- fixed: 1.18.3
vulnerable_at: 1.18.0
packages:
- package: crypto/rand
goos:
- windows
symbols:
- Read
summary: Indefinite hang with large buffers on Windows in crypto/rand
description: |-
On Windows, rand.Read will hang indefinitely if passed a buffer larger than 1 <<
32 - 1 bytes.
published: 2022-06-09T01:43:37Z
credits:
- Davis Goodin
- Quim Muntal of Microsoft
references:
- fix: https://go.dev/cl/402257
- fix: https://go.googlesource.com/go/+/bb1f4416180511231de6d17a1f2f55c82aafc863
- report: https://go.dev/issue/52561
- web: https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
cve_metadata:
id: CVE-2022-30634
cwe: 'CWE-835: Loop with Unreachable Exit Condition (''Infinite Loop'')'
description: |-
Infinite loop in Read in crypto/rand before Go 1.17.11 and Go 1.18.3 on Windows
allows attacker to cause an indefinite hang by passing a buffer larger than 1 <<
32 - 1 bytes.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0226.yaml
|
id: GO-2021-0226
modules:
- module: std
versions:
- fixed: 1.14.8
- introduced: 1.15.0-0
- fixed: 1.15.1
vulnerable_at: 1.15.0
packages:
- package: net/http/cgi
symbols:
- response.Write
- response.WriteHeader
- response.writeCGIHeader
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
- package: net/http/fcgi
symbols:
- response.Write
- response.WriteHeader
- response.writeCGIHeader
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Cross-site scripting in net/http/cgi and net/http/fcgi
description: |-
When a Handler does not explicitly set the Content-Type header, the the package
would default to “text/html”, which could cause a Cross-Site Scripting
vulnerability if an attacker can control any part of the contents of a response.
The Content-Type header is now set based on the contents of the first Write
using http.DetectContentType, which is consistent with the behavior of the
net/http package.
Although this protects some applications that validate the contents of uploaded
files, not setting the Content-Type header explicitly on any attacker-controlled
file is unsafe and should be avoided.
published: 2022-01-13T03:44:58Z
cves:
- CVE-2020-24553
credits:
- RedTeam Pentesting GmbH
references:
- fix: https://go.dev/cl/252179
- fix: https://go.googlesource.com/go/+/4f5cd0c0331943c7ec72df3b827d972584f77833
- web: https://groups.google.com/g/golang-announce/c/8wqlSbkLdPs
- report: https://go.dev/issue/40928
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1874.yaml
|
id: GO-2023-1874
modules:
- module: github.com/corazawaf/coraza/v2
vulnerable_at: 2.0.1
packages:
- package: github.com/corazawaf/coraza/v2/bodyprocessors
symbols:
- multipartBodyProcessor.Read
- module: github.com/corazawaf/coraza/v3
versions:
- fixed: 3.0.1
vulnerable_at: 3.0.0
packages:
- package: github.com/corazawaf/coraza/v3/internal/bodyprocessors
symbols:
- multipartBodyProcessor.ProcessRequest
summary: Denial of service in github.com/corazawaf/coraza/v2 and v3
description: |-
Due to the misuse of log.Fatalf, Coraza may crash after receiving crafted
requests from attackers.
cves:
- CVE-2023-40586
ghsas:
- GHSA-c2pj-v37r-2p6h
credits:
- rmb122
references:
- advisory: https://github.com/corazawaf/coraza/security/advisories/GHSA-c2pj-v37r-2p6h
- fix: https://github.com/corazawaf/coraza/commit/a5239ba3ce839e14d9b4f9486e1b4a403dcade8c
- web: https://github.com/corazawaf/coraza/releases/tag/v3.0.1
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1201.yaml
|
id: GO-2022-1201
modules:
- module: github.com/openshift/osin
versions:
- fixed: 1.0.2-0.20210113124101-8612686d6dda
vulnerable_at: 1.0.1
packages:
- package: github.com/openshift/osin
symbols:
- DefaultClient.ClientSecretMatches
- CheckClientSecret
derived_symbols:
- Server.HandleAccessRequest
- Server.HandleAuthorizeRequest
summary: Timing attack in github.com/openshift/osin
description: |-
Client secret checks are vulnerable to timing attacks, which could permit an
attacker to determine client secrets.
cves:
- CVE-2021-4294
ghsas:
- GHSA-m7qp-cj9p-gj85
references:
- fix: https://github.com/openshift/osin/pull/200
- fix: https://github.com/openshift/osin/commit/8612686d6dda34ae9ef6b5a974e4b7accb4fea29
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0503.yaml
|
id: GO-2022-0503
modules:
- module: github.com/ipld/go-car
versions:
- fixed: 0.4.0
vulnerable_at: 0.3.3
packages:
- package: github.com/ipld/go-car
- package: github.com/ipld/go-car/util
- module: github.com/ipld/go-car/v2
versions:
- introduced: 2.0.0
- fixed: 2.4.0
vulnerable_at: 2.3.0
packages:
- package: github.com/ipld/go-car/v2
- package: github.com/ipld/go-car/v2/blockstore
- package: github.com/ipld/go-car/v2/index
summary: Denial of service via malformed CAR data in github.com/ipld/go-car and go-car/v2
description: Decoding malformed CAR data can cause panics or excessive memory usage.
published: 2022-07-30T03:50:50Z
ghsas:
- GHSA-9x4h-8wgm-8xfg
references:
- advisory: https://github.com/advisories/GHSA-9x4h-8wgm-8xfg
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2699.yaml
|
id: GO-2024-2699
modules:
- module: github.com/jmorganca/ollama
versions:
- fixed: 0.1.29
vulnerable_at: 0.1.28
summary: Ollama DNS rebinding vulnerability in github.com/jmorganca/ollama
cves:
- CVE-2024-28224
ghsas:
- GHSA-5jx5-hqx5-2vrj
references:
- advisory: https://github.com/advisories/GHSA-5jx5-hqx5-2vrj
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-28224
- web: https://github.com/ollama/ollama/releases
- web: https://research.nccgroup.com/2024/04/08/technical-advisory-ollama-dns-rebinding-attack-cve-2024-28224
source:
id: GHSA-5jx5-hqx5-2vrj
created: 2024-06-06T16:17:36.326182-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2641.yaml
|
id: GO-2024-2641
modules:
- module: github.com/go-vela/worker
versions:
- fixed: 0.23.2
vulnerable_at: 0.23.1
summary: Insecure Variable Substitution in Vela in github.com/go-vela/worker
cves:
- CVE-2024-28236
ghsas:
- GHSA-pwx5-6wxg-px5h
references:
- advisory: https://github.com/go-vela/worker/security/advisories/GHSA-pwx5-6wxg-px5h
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-28236
- fix: https://github.com/go-vela/worker/commit/e1572743b008e4fbce31ebb1dcd23bf6a1a30297
source:
id: GHSA-pwx5-6wxg-px5h
created: 2024-05-17T16:14:41.981889-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0273.yaml
|
id: GO-2022-0273
modules:
- module: std
versions:
- fixed: 1.16.8
- introduced: 1.17.0-0
- fixed: 1.17.1
vulnerable_at: 1.17.0
packages:
- package: archive/zip
symbols:
- NewReader
- OpenReader
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Panic due to crafted inputs in archive/zip
description: |-
The NewReader and OpenReader functions in archive/zip can cause a panic or an
unrecoverable fatal error when reading an archive that claims to contain a large
number of files, regardless of its actual size. This is caused by an incomplete
fix for CVE-2021-33196.
published: 2022-05-18T18:23:31Z
cves:
- CVE-2021-39293
credits:
- OSS-Fuzz Project
- Emmanuel Odeke
references:
- fix: https://go.dev/cl/343434
- fix: https://go.googlesource.com/go/+/bacbc33439b124ffd7392c91a5f5d96eca8c0c0b
- report: https://go.dev/issue/47801
- web: https://groups.google.com/g/golang-announce/c/dx9d7IOseHw
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0082.yaml
|
id: GO-2021-0082
modules:
- module: github.com/facebook/fbthrift
versions:
- fixed: 0.31.1-0.20200311080807-483ed864d69f
vulnerable_at: 0.31.1-0.20200311052902-c8800899625e
packages:
- package: github.com/facebook/fbthrift/thrift/lib/go/thrift
summary: |-
Denial of service via malicious message size declaration in
github.com/facebook/fbthrift
description: |-
Thrift Servers preallocate memory for the declared size of messages before
checking the actual size of the message. This allows a malicious user to send
messages that declare that they are significantly larger than they actually are,
allowing them to force the server to allocate significant amounts of memory.
This can be used as a denial of service vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2019-11939
ghsas:
- GHSA-w3r9-r9w7-8h48
references:
- fix: https://github.com/facebook/fbthrift/commit/483ed864d69f307e9e3b9dadec048216100c0757
- web: https://www.facebook.com/security/advisories/cve-2019-11939
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2052.yaml
|
id: GO-2023-2052
modules:
- module: github.com/gofiber/fiber/v2
versions:
- fixed: 2.49.2-0.20230906112033-b8c9ede6efa2
vulnerable_at: 2.49.1
packages:
- package: github.com/gofiber/fiber/v2
symbols:
- Ctx.isLocalHost
derived_symbols:
- Ctx.IsFromLocal
summary: |-
IsFromLocal local address check can be circumvented in
github.com/gofiber/fiber/v2
description: |-
The Ctx.IsFromLocal function can incorrectly report a request as being sent from
localhost when the request contains an X-Forwarded-For header containing a
localhost IP address.
cves:
- CVE-2023-41338
ghsas:
- GHSA-3q5p-3558-364f
references:
- advisory: https://github.com/gofiber/fiber/security/advisories/GHSA-3q5p-3558-364f
- fix: https://github.com/gofiber/fiber/commit/b8c9ede6efa231116c4bd8bb9d5e03eac1cb76dc
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1923.yaml
|
id: GO-2023-1923
modules:
- module: github.com/mastercactapus/proxyprotocol
versions:
- fixed: 0.0.2
vulnerable_at: 0.0.1
packages:
- package: github.com/mastercactapus/proxyprotocol
symbols:
- parseV2
derived_symbols:
- Conn.LocalAddr
- Conn.ProxyHeader
- Conn.Read
- Conn.RemoteAddr
- Parse
summary: |-
Panic when handling invalid HAProxy PROXY v2 request in
github.com/mastercactapus/proxyprotocol
cves:
- CVE-2019-14243
ghsas:
- GHSA-85c5-ccm8-vr96
references:
- advisory: https://github.com/advisories/GHSA-85c5-ccm8-vr96
- report: https://github.com/mastercactapus/proxyprotocol/issues/1
- fix: https://github.com/mastercactapus/proxyprotocol/commit/5c4a101121fc3e868026189c7a73f7f19eef90ac
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2746.yaml
|
id: GO-2024-2746
modules:
- module: k8s.io/kubernetes
versions:
- fixed: 1.27.13
- introduced: 1.28.0
- fixed: 1.28.9
- introduced: 1.29.0
- fixed: 1.29.4
vulnerable_at: 1.29.3
packages:
- package: k8s.io/kubernetes/plugin/pkg/admission/serviceaccount
symbols:
- Plugin.limitSecretReferences
summary: |-
Kubernetes allows bypassing mountable secrets policy imposed by the
ServiceAccount admission plugin in k8s.io/kubernetes
cves:
- CVE-2024-3177
ghsas:
- GHSA-pxhw-596r-rwq5
references:
- advisory: https://github.com/advisories/GHSA-pxhw-596r-rwq5
- fix: https://github.com/kubernetes/kubernetes/commit/7c861b1ecad97e1ab9332c970c9294a72065111a
- web: https://github.com/kubernetes/kubernetes/issues/124336
- web: https://groups.google.com/g/kubernetes-security-announce/c/JxjHf7fkVd8/m/oVCzypyOAQAJ
source:
id: GHSA-pxhw-596r-rwq5
created: 2024-05-17T16:12:44.610818-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2963.yaml
|
id: GO-2024-2963
modules:
- module: std
versions:
- fixed: 1.21.12
- introduced: 1.22.0-0
- fixed: 1.22.5
vulnerable_at: 1.22.4
packages:
- package: net/http
symbols:
- persistConn.readResponse
derived_symbols:
- Client.CloseIdleConnections
- Client.Do
- Client.Get
- Client.Head
- Client.Post
- Client.PostForm
- Get
- Head
- Post
- PostForm
- Transport.CancelRequest
- Transport.CloseIdleConnections
- Transport.RoundTrip
summary: Denial of service due to improper 100-continue handling in net/http
description: |-
The net/http HTTP/1.1 client mishandled the case where a server responds to a
request with an "Expect: 100-continue" header with a non-informational (200 or
higher) status. This mishandling could leave a client connection in an invalid
state, where the next request sent on the connection will fail.
An attacker sending a request to a net/http/httputil.ReverseProxy proxy can
exploit this mishandling to cause a denial of service by sending "Expect:
100-continue" requests which elicit a non-informational response from the
backend. Each such request leaves the proxy with an invalid connection, and
causes one subsequent request using that connection to fail.
credits:
- Geoff Franks
references:
- fix: https://go.dev/cl/591255
- report: https://go.dev/issue/67555
- web: https://groups.google.com/g/golang-dev/c/t0rK-qHBqzY/m/6MMoAZkMAgAJ
cve_metadata:
id: CVE-2024-24791
cwe: 'CWE 400: Uncontrolled Resource Consumption'
source:
id: go-security-team
created: 2024-07-02T15:43:26.900923-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2432.yaml
|
id: GO-2024-2432
modules:
- module: github.com/cubefs/cubefs
non_go_versions:
- fixed: 3.3.1
vulnerable_at: 2.5.2+incompatible
summary: CubeFS timing attack can leak user passwords in github.com/cubefs/cubefs
cves:
- CVE-2023-46739
ghsas:
- GHSA-8579-7p32-f398
references:
- advisory: https://github.com/cubefs/cubefs/security/advisories/GHSA-8579-7p32-f398
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-46739
- fix: https://github.com/cubefs/cubefs/commit/6a0d5fa45a77ff20c752fa9e44738bf5d86c84bd
- fix: https://github.com/cubefs/cubefs/commit/c21d034d2fcd051ffd64afeafc68cbcb39d26551
source:
id: GHSA-8579-7p32-f398
created: 2024-06-14T11:34:40.709598-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2822.yaml
|
id: GO-2024-2822
modules:
- module: github.com/tiagorlampert/CHAOS
versions:
- fixed: 0.0.0-20220716132853-b47438d36e3a
vulnerable_at: 0.0.0-20220408031238-8963de253a5b
packages:
- package: github.com/tiagorlampert/CHAOS/services
symbols:
- clientService.BuildClient
- package: github.com/tiagorlampert/CHAOS/delivery/http
symbols:
- httpController.generateBinaryPostHandler
summary: Arbitrary code execution in github.com/tiagorlampert/CHAOS
description: A remote attacker can execute arbitrary commands via crafted HTTP requests.
cves:
- CVE-2024-30850
- CVE-2024-33434
ghsas:
- GHSA-p3j6-f45h-hw5f
- GHSA-xfjj-f699-rc79
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-33434
- fix: https://github.com/tiagorlampert/CHAOS/pull/95
- fix: https://github.com/tiagorlampert/CHAOS/commit/1b451cf62582295b7225caf5a7b506f0bad56f6b
- fix: https://github.com/tiagorlampert/CHAOS/commit/24c9e109b5be34df7b2bce8368eae669c481ed5e
- web: https://gist.github.com/slimwang/d1ec6645ba9012a551ea436679244496
source:
id: GHSA-xfjj-f699-rc79
created: 2024-05-08T20:07:33.796429-07:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2768.yaml
|
id: GO-2024-2768
modules:
- module: github.com/rancher/rancher
versions:
- introduced: 2.0.0+incompatible
non_go_versions:
- fixed: 2.4.16
- introduced: 2.5.0
- fixed: 2.5.9
summary: |-
Rancher does not properly specify ApiGroup when creating Kubernetes RBAC
resources in github.com/rancher/rancher
cves:
- CVE-2021-25318
ghsas:
- GHSA-f9xf-jq4j-vqw4
references:
- advisory: https://github.com/advisories/GHSA-f9xf-jq4j-vqw4
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-25318
- report: https://github.com/rancher/rancher/issues/33590
- web: https://bugzilla.suse.com/show_bug.cgi?id=1184913
notes:
- fix: 'github.com/rancher/rancher: could not add vulnerable_at: latest version (1.6.30) is before last introduced version'
source:
id: GHSA-f9xf-jq4j-vqw4
created: 2024-06-26T14:03:23.840942-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0033.yaml
|
id: GO-2020-0033
modules:
- module: aahframe.work
versions:
- fixed: 0.12.4
vulnerable_at: 0.12.3
packages:
- package: aahframe.work
symbols:
- HTTPEngine.Handle
derived_symbols:
- Application.Run
- Application.ServeHTTP
- Application.Start
summary: Path Traversal in aahframe.work
description: |-
Due to improper sanitization of user input, HTTPEngine.Handle allows for
directory traversal, allowing an attacker to read files outside of the target
directory that the server has permission to read.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-vp56-r7qv-783v
credits:
- '@snyff'
references:
- fix: https://github.com/go-aah/aah/pull/267
- fix: https://github.com/go-aah/aah/commit/881dc9f71d1f7a4e8a9a39df9c5c081d3a2da1ec
- report: https://github.com/go-aah/aah/issues/266
cve_metadata:
id: CVE-2020-36559
cwe: 'CWE 23: Relative Path Traversal'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2817.yaml
|
id: GO-2024-2817
modules:
- module: github.com/karmada-io/karmada
unsupported_versions:
- last_affected: 1.9.0
vulnerable_at: 1.10.0
summary: karmada vulnerable to arbitrary code execution via a crafted command in github.com/karmada-io/karmada
cves:
- CVE-2024-33396
ghsas:
- GHSA-wccg-v638-j9q2
references:
- advisory: https://github.com/advisories/GHSA-wccg-v638-j9q2
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-33396
- web: https://gist.github.com/HouqiyuA/2b56a893c06553013982836abb77ba50
source:
id: GHSA-wccg-v638-j9q2
created: 2024-06-04T14:27:43.925263-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0460.yaml
|
id: GO-2022-0460
modules:
- module: github.com/pion/dtls/v2
versions:
- fixed: 2.1.4
vulnerable_at: 2.1.3
packages:
- package: github.com/pion/dtls/v2
symbols:
- fragmentBuffer.pop
derived_symbols:
- Client
- ClientWithContext
- Dial
- DialWithContext
- Resume
- Server
- ServerWithContext
- handshakeFSM.Run
- listener.Accept
summary: Infinite loop in github.com/pion/dtls/v2
description: |-
An attacker can send packets that send the DTLS server or client into an
infinite loop.
published: 2022-07-01T20:07:34Z
cves:
- CVE-2022-29190
ghsas:
- GHSA-cm8f-h6j3-p25c
references:
- fix: https://github.com/pion/dtls/commit/e0b2ce3592e8e7d73713ac67b363a2e192a4cecf
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0520.yaml
|
id: GO-2022-0520
modules:
- module: std
versions:
- fixed: 1.17.12
- introduced: 1.18.0-0
- fixed: 1.18.4
vulnerable_at: 1.18.3
packages:
- package: net/http
symbols:
- Header.Clone
summary: Exposure of client IP addresses in net/http
description: |-
Client IP adresses may be unintentionally exposed via X-Forwarded-For headers.
When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map
containing a nil value for the X-Forwarded-For header, ReverseProxy sets the
client IP as the value of the X-Forwarded-For header, contrary to its
documentation.
In the more usual case where a Director function sets the X-Forwarded-For header
value to nil, ReverseProxy leaves the header unmodified as expected.
published: 2022-07-28T17:23:05Z
credits:
- Christian Mehlmauer
references:
- fix: https://go.dev/cl/412857
- fix: https://go.googlesource.com/go/+/b2cc0fecc2ccd80e6d5d16542cc684f97b3a9c8a
- report: https://go.dev/issue/53423
- web: https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE
cve_metadata:
id: CVE-2022-32148
cwe: 'CWE-200: Information Exposure'
description: |-
Improper exposure of client IP addresses in net/http before Go 1.17.12 and Go
1.18.4 can be triggered by calling httputil.ReverseProxy.ServeHTTP with a
Request.Header map containing a nil value for the X-Forwarded-For header, which
causes ReverseProxy to set the client IP as the value of the X-Forwarded-For
header.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0224.yaml
|
id: GO-2021-0224
modules:
- module: std
versions:
- fixed: 1.13.13
- introduced: 1.14.0-0
- fixed: 1.14.5
vulnerable_at: 1.14.4
packages:
- package: net/http
symbols:
- expectContinueReader.Read
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Data race and crash in net/http
description: |-
HTTP servers where the Handler concurrently reads the request body and writes a
response can encounter a data race and crash. The httputil.ReverseProxy Handler
is affected.
published: 2022-02-17T17:36:04Z
cves:
- CVE-2020-15586
credits:
- Mikael Manukyan
- Andrew Kutz
- Dave McClure
- Tim Downey
- Clay Kauzlaric
- Gabe Rosenhouse
references:
- fix: https://go.dev/cl/242598
- fix: https://go.googlesource.com/go/+/fa98f46741f818913a8c11b877520a548715131f
- report: https://go.dev/issue/34902
- web: https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0621.yaml
|
id: GO-2022-0621
modules:
- module: k8s.io/kube-state-metrics
versions:
- introduced: 1.7.0
- fixed: 1.7.2
vulnerable_at: 1.7.0
packages:
- package: k8s.io/kube-state-metrics/internal/store
symbols:
- kubeAnnotationsToPrometheusLabels
derived_symbols:
- Builder.Build
summary: Exposure of sensitive information in k8s.io/kube-state-metrics
description: |-
Exposing annotations as metrics can leak secrets.
An experimental feature of kube-state-metrics enables annotations to be exposed
as metrics. By default, metrics only expose metadata about secrets. However, a
combination of the default kubectl behavior and this new feature can cause the
entire secret content to end up in metric labels.
published: 2021-05-18T15:38:54Z
cves:
- CVE-2019-10223
- CVE-2019-17110
ghsas:
- GHSA-2v6x-frw8-7r7f
- GHSA-c92w-72c5-9x59
credits:
- Moritz S.
references:
- fix: https://github.com/kubernetes/kube-state-metrics/commit/03122fe3e2df49a9a7298b8af921d3c37c430f7f
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0072.yaml
|
id: GO-2021-0072
modules:
- module: github.com/docker/distribution
versions:
- fixed: 2.7.0-rc.0+incompatible
vulnerable_at: 2.6.2+incompatible
vulnerable_at_requires:
- github.com/Sirupsen/logrus@v1.0.6
packages:
- package: github.com/docker/distribution/registry/handlers
symbols:
- copyFullPayload
derived_symbols:
- App.ServeHTTP
- NewApp
- blobUploadHandler.PatchBlobData
- blobUploadHandler.PutBlobUploadComplete
- catalogHandler.GetCatalog
- imageManifestHandler.GetImageManifest
- imageManifestHandler.PutImageManifest
- package: github.com/docker/distribution/registry/storage
symbols:
- blobStore.Get
derived_symbols:
- PurgeUploads
- Walk
- blobStore.Enumerate
- linkedBlobStore.Enumerate
- linkedBlobStore.Get
- manifestStore.Enumerate
- manifestStore.Get
- registry.Enumerate
- registry.Repositories
summary: Uncontrolled resource allocation in github.com/docker/distribution
description: |-
Various storage methods do not impose limits on how much content is accepted
from user requests, allowing a malicious user to force the caller to allocate an
arbitrary amount of memory.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2017-11468
ghsas:
- GHSA-h62f-wm92-2cmw
references:
- fix: https://github.com/distribution/distribution/pull/2340
- fix: https://github.com/distribution/distribution/commit/91c507a39abfce14b5c8541cf284330e22208c0f
- web: https://access.redhat.com/errata/RHSA-2017:2603
- web: http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00047.html
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0265.yaml
|
id: GO-2021-0265
modules:
- module: github.com/tidwall/gjson
versions:
- fixed: 1.9.3
vulnerable_at: 1.9.2
packages:
- package: github.com/tidwall/gjson
symbols:
- parseObject
- queryMatches
derived_symbols:
- Get
- GetBytes
- GetMany
- GetManyBytes
- Result.Get
summary: Denial of service via maliciously crafted path in github.com/tidwall/gjson
description: |-
A maliciously crafted path can cause Get and other query functions to consume
excessive amounts of CPU and time.
published: 2022-08-15T18:06:07Z
cves:
- CVE-2021-42248
- CVE-2021-42836
ghsas:
- GHSA-c9gm-7rfj-8w5h
- GHSA-ppj4-34rq-v8j9
references:
- fix: https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96
- web: https://github.com/tidwall/gjson/issues/237
- web: https://github.com/tidwall/gjson/issues/236
- web: https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0462.yaml
|
id: GO-2022-0462
modules:
- module: github.com/pion/dtls/v2
versions:
- fixed: 2.1.5
vulnerable_at: 2.1.4
packages:
- package: github.com/pion/dtls/v2
symbols:
- flight4Parse
derived_symbols:
- Client
- ClientWithContext
- Dial
- DialWithContext
- Resume
- Server
- ServerWithContext
- handshakeFSM.Run
- listener.Accept
summary: Improper validation of client certificates in github.com/pion/dtls/v2
description: |-
Client-provided certificates are not correctly validated, and must not be
trusted.
DTLS client certificates must be accompanied by proof that the client possesses
the private key for the certificate. The Pion DTLS server accepted client
certificates unaccompanied by this proof, permitting an attacker to present any
certificate and have it accepted as valid.
published: 2022-07-01T20:07:12Z
cves:
- CVE-2022-29222
ghsas:
- GHSA-w45j-f832-hxvh
references:
- fix: https://github.com/pion/dtls/commit/d2f797183a9f044ce976e6df6f362662ca722412
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2534.yaml
|
id: GO-2024-2534
modules:
- module: github.com/rancher/apiserver
versions:
- fixed: 0.0.0-20240207153957-4fd7d821d952
vulnerable_at: 0.0.0-20240206174200-14e7493da5d3
packages:
- package: github.com/rancher/apiserver/pkg/writer
symbols:
- HTMLResponseWriter.write
derived_symbols:
- HTMLResponseWriter.Write
- HTMLResponseWriter.WriteList
- package: github.com/rancher/apiserver/pkg/urlbuilder
symbols:
- ParseRequestURL
derived_symbols:
- New
- NewPrefixed
summary: Unauthenticated cross-site scripting in github.com/rancher/apiserver
cves:
- CVE-2023-32192
ghsas:
- GHSA-833m-37f7-jq55
credits:
- diego95root
- kujalamathias
references:
- advisory: https://github.com/rancher/apiserver/security/advisories/GHSA-833m-37f7-jq55
- fix: https://github.com/rancher/apiserver/commit/4df268e250f625fa323349062636496e0aeff4e4
- fix: https://github.com/rancher/apiserver/commit/4e102cf0d07b1af3d10d82c3e5a751a869b8a6c7
- fix: https://github.com/rancher/apiserver/commit/4fd7d821d952510bfe38c9d4a3e2a65157f50525
- fix: https://github.com/rancher/apiserver/commit/69b3c2b56f3fa5a421889c533dada8cd08783cda
- fix: https://github.com/rancher/apiserver/commit/97a10a30200cb851afd8ee85ee6b2295c4b6e5ee
- fix: https://github.com/rancher/apiserver/commit/a3b9e3721c1b558ee63aec9594e37c223a5c8437
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2531.yaml
|
id: GO-2024-2531
modules:
- module: github.com/1Panel-dev/1Panel
versions:
- fixed: 1.9.6
vulnerable_at: 1.9.5
summary: 1Panel set-cookie is missing the Secure keyword in github.com/1Panel-dev/1Panel
cves:
- CVE-2024-24768
ghsas:
- GHSA-9xfw-jjq2-7v8h
references:
- advisory: https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-9xfw-jjq2-7v8h
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-24768
- fix: https://github.com/1Panel-dev/1Panel/commit/1169648162c4b9b48e0b4aa508f9dea4d6bc50d5
- fix: https://github.com/1Panel-dev/1Panel/pull/3817
source:
id: GHSA-9xfw-jjq2-7v8h
created: 2024-06-14T11:40:41.579857-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0300.yaml
|
id: GO-2022-0300
modules:
- module: github.com/graph-gophers/graphql-go
versions:
- fixed: 1.3.0
vulnerable_at: 1.2.0
packages:
- package: github.com/graph-gophers/graphql-go
symbols:
- Schema.ValidateWithVariables
- Schema.exec
- Schema.subscribe
derived_symbols:
- Schema.Exec
- Schema.Subscribe
- Schema.ToJSON
- Schema.Validate
summary: Panic via malicious inputs in github.com/graph-gophers/graphql-go
description: |-
Malicious inputs can cause a panic.
A maliciously crafted input can cause a stack overflow and panic. Any user with
access to the GraphQL can send such a query.
This issue only occurs when using the graphql.MaxDepth schema option (which is
highly recommended in most cases).
published: 2022-07-15T23:10:20Z
cves:
- CVE-2022-21708
ghsas:
- GHSA-mh3m-8c74-74xh
references:
- fix: https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2519.yaml
|
id: GO-2024-2519
modules:
- module: github.com/grafana/grafana
non_go_versions:
- introduced: 6.0.0
- fixed: 7.2.1
vulnerable_at: 5.4.5+incompatible
summary: Grafana world readable configuration files in github.com/grafana/grafana
cves:
- CVE-2020-12459
ghsas:
- GHSA-m25m-5778-fm22
unknown_aliases:
- BIT-grafana-2020-12459
references:
- advisory: https://github.com/advisories/GHSA-m25m-5778-fm22
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-12459
- fix: https://github.com/grafana/grafana/commit/102448040d5132460e3b0013e03ebedec0677e00
- report: https://github.com/grafana/grafana/issues/8283
- web: https://access.redhat.com/security/cve/CVE-2020-12459
- web: https://bugzilla.redhat.com/show_bug.cgi?id=1827765
- web: https://bugzilla.redhat.com/show_bug.cgi?id=1829724
- web: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTQCKJZZYXMCSHJFZZ3YXEO5NUBANGZS
- web: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEBCIEVSYIDDCA7FTRS2IFUOYLIQU34A
- web: https://security.netapp.com/advisory/ntap-20200518-0004
- web: https://src.fedoraproject.org/rpms/grafana/c/fab93d67363eb0a9678d9faf160cc88237f26277
source:
id: GHSA-m25m-5778-fm22
created: 2024-07-02T11:58:25.857462-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2905.yaml
|
id: GO-2024-2905
modules:
- module: github.com/openshift/telemeter
vulnerable_at: 3.11.0+incompatible
summary: 'Openshift/telemeter: iss check during jwt authentication can be bypassed in github.com/openshift/telemeter'
cves:
- CVE-2024-5037
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-5037
- fix: https://github.com/kubernetes/kubernetes/pull/123540
- report: https://bugzilla.redhat.com/show_bug.cgi?id=2272339
- web: https://access.redhat.com/security/cve/CVE-2024-5037
- web: https://github.com/openshift/telemeter/blob/a9417a6062c3a31ed78c06ea3a0613a52f2029b2/pkg/authorize/jwt/client_authorizer.go#L78
source:
id: CVE-2024-5037
created: 2024-06-27T15:54:56.792975-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2926.yaml
|
id: GO-2024-2926
modules:
- module: github.com/evmos/evmos
vulnerable_at: 1.1.3
- module: github.com/evmos/evmos/v2
vulnerable_at: 2.0.2
- module: github.com/evmos/evmos/v3
vulnerable_at: 3.0.3
- module: github.com/evmos/evmos/v4
vulnerable_at: 4.0.2
- module: github.com/evmos/evmos/v5
vulnerable_at: 5.0.1
- module: github.com/evmos/evmos/v6
vulnerable_at: 6.0.4
- module: github.com/evmos/evmos/v7
vulnerable_at: 7.0.0
- module: github.com/evmos/evmos/v8
vulnerable_at: 8.2.3
- module: github.com/evmos/evmos/v9
vulnerable_at: 9.1.0
- module: github.com/evmos/evmos/v10
vulnerable_at: 10.0.1
- module: github.com/evmos/evmos/v11
vulnerable_at: 11.0.2
- module: github.com/evmos/evmos/v12
vulnerable_at: 12.1.6
- module: github.com/evmos/evmos/v13
vulnerable_at: 13.0.2
- module: github.com/evmos/evmos/v14
vulnerable_at: 14.1.0
- module: github.com/evmos/evmos/v15
vulnerable_at: 15.0.0
- module: github.com/evmos/evmos/v16
vulnerable_at: 16.0.4
- module: github.com/evmos/evmos/v17
vulnerable_at: 17.0.1
- module: github.com/evmos/evmos/v18
versions:
- fixed: 18.0.0
summary: Evmos is missing precompile checks in github.com/evmos/evmos
cves:
- CVE-2024-37158
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37158
- fix: https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb
- web: https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v
notes:
- fix: 'github.com/evmos/evmos/v18: could not add vulnerable_at: could not find tagged version between introduced and fixed'
source:
id: CVE-2024-37158
created: 2024-06-27T15:54:31.357366-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2652.yaml
|
id: GO-2024-2652
modules:
- module: github.com/argoproj/argo-cd/v2
versions:
- fixed: 2.8.13
- introduced: 2.9.0
- fixed: 2.9.9
- introduced: 2.10.0
- fixed: 2.10.4
vulnerable_at: 2.10.3
packages:
- package: github.com/argoproj/argo-cd/v2/util/session
symbols:
- SessionManager.updateFailureCount
- getMaximumCacheSize
derived_symbols:
- SessionManager.VerifyUsernamePassword
summary: Brute force protection bypass in github.com/argoproj/argo-cd/v2
description: |-
An attacker can effectively bypass the rate limit and brute force protections in
Argo CD by exploiting the application's weak cache-based mechanism. The
application's brute force protection relies on a cache mechanism that tracks
login attempts for each user. An attacker can overflow this cache by bombarding
it with login attempts for different users, thereby pushing out the admin
account's failed attempts and effectively resetting the rate limit for that
account.
cves:
- CVE-2024-21662
- CVE-2024-21652
ghsas:
- GHSA-2vgg-9h6w-m454
- GHSA-x32m-mvfj-52xv
credits:
- '@nadava669'
- '@pasha-codefresh'
- '@crenshaw-dev'
- '@todaywasawesome'
- '@jannfis'
references:
- fix: https://github.com/argoproj/argo-cd/commit/17b0df1168a4c535f6f37e95f25ed7cd81e1fa4d
- fix: https://github.com/argoproj/argo-cd/commit/6e181d72b31522f886a2afa029d5b26d7912ec7b
- fix: https://github.com/argoproj/argo-cd/commit/cebb6538f7944c87ca2fecb5d17f8baacc431456
- web: https://argo-cd.readthedocs.io/en/stable/security_considerations/#cve-2020-8827-insufficient-anti-automationanti-brute-force
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2704.yaml
|
id: GO-2024-2704
modules:
- module: github.com/hashicorp/consul
versions:
- introduced: 1.16.0
- fixed: 1.16.1
vulnerable_at: 1.16.0
summary: |-
Consul JWT Auth in L7 Intentions Allow for Mismatched Service Identity and JWT
Providers in github.com/hashicorp/consul
cves:
- CVE-2023-3518
ghsas:
- GHSA-9rhf-q362-77mx
unknown_aliases:
- BIT-consul-2023-3518
references:
- advisory: https://github.com/advisories/GHSA-9rhf-q362-77mx
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-3518
- web: https://discuss.hashicorp.com/t/hcsec-2023-25-consul-jwt-auth-in-l7-intentions-allow-for-mismatched-service-identity-and-jwt-providers/57004
source:
id: GHSA-9rhf-q362-77mx
created: 2024-05-17T16:13:44.520242-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2649.yaml
|
id: GO-2024-2649
modules:
- module: github.com/go-vela/types
versions:
- fixed: 0.23.2
vulnerable_at: 0.23.1
summary: Types for Vela Insecure Variable Substitution in github.com/go-vela/types
ghsas:
- GHSA-7v38-w32m-wx4m
references:
- advisory: https://github.com/go-vela/types/security/advisories/GHSA-7v38-w32m-wx4m
- fix: https://github.com/go-vela/types/commit/2e046fceb8fe56fb7170495962f24475cee78d46
source:
id: GHSA-7v38-w32m-wx4m
created: 2024-05-17T16:14:31.393087-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2428.yaml
|
id: GO-2024-2428
modules:
- module: k8s.io/ingress-nginx
non_go_versions:
- fixed: 1.9.0
vulnerable_at: 1.0.0-alpha.1
summary: |-
Ingress-nginx code injection via nginx.ingress.kubernetes.io/permanent-redirect
annotation in k8s.io/ingress-nginx
cves:
- CVE-2023-5044
ghsas:
- GHSA-fp9f-44c2-cw27
unknown_aliases:
- BIT-nginx-ingress-controller-2023-5044
references:
- advisory: https://github.com/advisories/GHSA-fp9f-44c2-cw27
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-5044
- web: http://www.openwall.com/lists/oss-security/2023/10/25/3
- web: https://github.com/kubernetes/ingress-nginx/issues/10572
- web: https://groups.google.com/g/kubernetes-security-announce/c/ukuYYvRNel0
- web: https://security.netapp.com/advisory/ntap-20240307-0012
source:
id: GHSA-fp9f-44c2-cw27
created: 2024-06-14T11:34:12.417676-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0102.yaml
|
id: GO-2021-0102
modules:
- module: code.cloudfoundry.org/gorouter
versions:
- fixed: 0.0.0-20191101214924-b1b5c44e050f
vulnerable_at: 0.0.0-20191101214739-a658664ae1e3
packages:
- package: code.cloudfoundry.org/gorouter/common/secure
symbols:
- AesGCM.Decrypt
- module: github.com/cloudfoundry/gorouter
versions:
- fixed: 0.0.0-20191101214924-b1b5c44e050f
vulnerable_at: 0.0.0-20191101214739-a658664ae1e3
packages:
- package: github.com/cloudfoundry/gorouter/common/secure
symbols:
- AesGCM.Decrypt
summary: Panic in decryption in code.cloudfoundry.org/gorouter
description: |-
Due to improper input validation, a maliciously crafted input can cause a panic,
due to incorrect nonce size. If this package is used to decrypt user supplied
messages without checking the size of supplied nonces, this may be used as a
vector for a denial of service attack.
published: 2021-07-28T18:08:05Z
cves:
- CVE-2019-11289
ghsas:
- GHSA-5796-p3m6-9qj4
references:
- fix: https://github.com/cloudfoundry/gorouter/commit/b1b5c44e050f73b399b379ca63a42a2c5780a83f
- web: https://www.cloudfoundry.org/blog/cve-2019-11289/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0526.yaml
|
id: GO-2022-0526
modules:
- module: std
versions:
- fixed: 1.17.12
- introduced: 1.18.0-0
- fixed: 1.18.4
vulnerable_at: 1.18.3
packages:
- package: encoding/gob
symbols:
- Decoder.decIgnoreOpFor
- Decoder.compileIgnoreSingle
- Decoder.compileDec
summary: Stack exhaustion when decoding certain messages in encoding/gob
description: |-
Calling Decoder.Decode on a message which contains deeply nested structures can
cause a panic due to stack exhaustion.
published: 2022-07-20T20:52:17Z
references:
- fix: https://go.dev/cl/417064
- fix: https://go.googlesource.com/go/+/6fa37e98ea4382bf881428ee0c150ce591500eb7
- report: https://go.dev/issue/53615
- web: https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE
cve_metadata:
id: CVE-2022-30635
cwe: 'CWE-674: Uncontrolled Recursion'
description: |-
Uncontrolled recursion in Decoder.Decode in encoding/gob before Go 1.17.12 and
Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a
message which contains deeply nested structures.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2783.yaml
|
id: GO-2024-2783
modules:
- module: github.com/IBAX-io/go-ibax
versions:
- fixed: 1.4.2
vulnerable_at: 1.4.0
summary: IBAX go-ibax vulnerable to SQL injection in github.com/IBAX-io/go-ibax
cves:
- CVE-2022-3800
ghsas:
- GHSA-rwcf-gq22-ph83
references:
- advisory: https://github.com/advisories/GHSA-rwcf-gq22-ph83
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-3800
- fix: https://github.com/IBAX-io/go-ibax/commit/b0183d8e550836dc50282ee74ff421ee41b25a37
- report: https://github.com/IBAX-io/go-ibax/issues/2061
- web: https://vuldb.com/?id.212636
source:
id: GHSA-rwcf-gq22-ph83
created: 2024-06-04T17:58:37.976778-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2825.yaml
|
id: GO-2024-2825
modules:
- module: cmd
versions:
- fixed: 1.21.10
- introduced: 1.22.0-0
- fixed: 1.22.3
vulnerable_at: 1.22.2
packages:
- package: cmd/go
goos:
- darwin
summary: Arbitrary code execution during build on Darwin in cmd/go
description: |-
On Darwin, building a Go module which contains CGO can trigger arbitrary code
execution when using the Apple version of ld, due to usage of the -lto_library
flag in a "#cgo LDFLAGS" directive.
credits:
- Juho Forsén (Mattermost)
references:
- report: https://go.dev/issue/67119
- fix: https://go.dev/cl/583815
- web: https://groups.google.com/g/golang-announce/c/wkkO4P9stm0
cve_metadata:
id: CVE-2024-24787
cwe: 'CWE 74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (''Injection'')'
references:
- https://security.netapp.com/advisory/ntap-20240531-0006/
- http://www.openwall.com/lists/oss-security/2024/05/08/3
source:
id: go-security-team
created: 2024-05-07T16:50:09.179876-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0316.yaml
|
id: GO-2022-0316
modules:
- module: github.com/open-policy-agent/opa
versions:
- introduced: 0.33.1
- fixed: 0.37.2
vulnerable_at: 0.33.1
packages:
- package: github.com/open-policy-agent/opa/format
symbols:
- groupIterable
derived_symbols:
- Ast
- MustAst
- Source
summary: Incorrect calculation in github.com/open-policy-agent/opa
description: |-
Pretty-printing an AST that contains synthetic nodes can change the logic of
some statements by reordering array literals.
published: 2022-07-27T20:27:33Z
cves:
- CVE-2022-23628
ghsas:
- GHSA-hcw3-j74m-qc58
references:
- advisory: https://github.com/open-policy-agent/opa/security/advisories/GHSA-hcw3-j74m-qc58
- fix: https://github.com/open-policy-agent/opa/commit/932e4ffc37a590ace79e9b75ca4340288c220239
- web: https://github.com/open-policy-agent/opa/commit/2bd8edab9e10e2dc9cf76ae8335ced0c224f3055
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1595.yaml
|
id: GO-2023-1595
modules:
- module: filippo.io/nistec
versions:
- fixed: 0.0.2
vulnerable_at: 0.0.1
packages:
- package: filippo.io/nistec
goarch:
- amd64
- arm64
- ppc64le
- s390x
symbols:
- p256OrdInverse
- P256Point.ScalarBaseMult
- P256Point.ScalarMult
summary: Incorrect multiplication of unreduced P-256 scalars in filippo.io/nistec
description: |-
Multiplication of certain unreduced P-256 scalars produce incorrect results.
There are no protocols known at this time that can be attacked due to this.
ghsas:
- GHSA-f6hc-9g49-xmx7
credits:
- Guido Vranken via the Ethereum Foundation bug bounty program
references:
- report: https://go.dev/issue/58647
- fix: https://github.com/FiloSottile/nistec/commit/c58aa1223ccf3943513e1e661cebce95af137244
cve_metadata:
id: CVE-2023-24533
cwe: 'CWE-682: Incorrect Calculation'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0004.yaml
|
id: GO-2020-0004
modules:
- module: github.com/nanobox-io/golang-nanoauth
versions:
- introduced: 0.0.0-20160722212129-ac0cc4484ad4
- fixed: 0.0.0-20200131131040-063a3fb69896
vulnerable_at: 0.0.0-20190311151057-c2ebbac481bb
packages:
- package: github.com/nanobox-io/golang-nanoauth
symbols:
- Auth.ServeHTTP
- Auth.ListenAndServeTLS
- Auth.ListenAndServe
derived_symbols:
- ListenAndServe
- ListenAndServeTLS
summary: Authentication bypass in github.com/nanobox-io/golang-nanoauth
description: |-
If any of the ListenAndServe functions are called with an empty token, token
authentication is disabled globally for all listeners.
Also, a minor timing side channel was present allowing attackers with very low
latency and able to make many requests to potentially recover the token.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-hrm3-3xm6-x33h
credits:
- '@bouk'
references:
- fix: https://github.com/nanobox-io/golang-nanoauth/pull/5
- fix: https://github.com/nanobox-io/golang-nanoauth/commit/063a3fb69896acf985759f0fe3851f15973993f3
cve_metadata:
id: CVE-2020-36569
cwe: 'CWE-305: Authentication Bypass by Primary Weakness'
description: |-
Authentication is globally bypassed in github.com/nanobox-io/golang-nanoauth
between v0.0.0-20160722212129-ac0cc4484ad4 and
v0.0.0-20200131131040-063a3fb69896 if ListenAndServe is called with an empty
token.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2564.yaml
|
id: GO-2024-2564
modules:
- module: github.com/greenpau/caddy-security
unsupported_versions:
- last_affected: 1.1.23
vulnerable_at: 1.1.29
summary: Improper Validation of Array Index in github.com/greenpau/caddy-security
cves:
- CVE-2024-21493
ghsas:
- GHSA-8h95-jcp5-pjpr
references:
- advisory: https://github.com/advisories/GHSA-8h95-jcp5-pjpr
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21493
- report: https://github.com/greenpau/caddy-security/issues/263
- web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy
- web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-5961078
source:
id: GHSA-8h95-jcp5-pjpr
created: 2024-06-14T11:42:16.399855-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0209.yaml
|
id: GO-2022-0209
modules:
- module: golang.org/x/crypto
versions:
- fixed: 0.0.0-20190320223903-b7391e95e576
vulnerable_at: 0.0.0-20190313024323-a1f597ede03a
packages:
- package: golang.org/x/crypto/salsa20/salsa
goarch:
- amd64
symbols:
- XORKeyStream
summary: Insufficiently random values in golang.org/x/crypto/salsa20
description: |-
XORKeyStream generates incorrect and insecure output for very large inputs.
If more than 256 GiB of keystream is generated, or if the counter otherwise
grows greater than 32 bits, the amd64 implementation will first generate
incorrect output, and then cycle back to previously generated keystream.
Repeated keystream bytes can lead to loss of confidentiality in encryption
applications, or to predictability in CSPRNG applications.
The issue might affect uses of golang.org/x/crypto/nacl with extremely large
messages.
Architectures other than amd64 and uses that generate less than 256 GiB of
keystream for a single salsa20.XORKeyStream invocation are unaffected.
published: 2022-07-01T20:15:25Z
cves:
- CVE-2019-11840
ghsas:
- GHSA-r5c5-pr8j-pfp7
credits:
- Michael McLoughlin
references:
- fix: https://go.dev/cl/168406
- fix: https://go.googlesource.com/crypto/+/b7391e95e576cacdcdd422573063bc057239113d
- report: https://go.dev/issue/30965
- web: https://groups.google.com/g/golang-announce/c/tjyNcJxb2vQ/m/n0NRBziSCAAJ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0414.yaml
|
id: GO-2022-0414
modules:
- module: github.com/Masterminds/vcs
versions:
- fixed: 1.13.3
vulnerable_at: 1.13.1
packages:
- package: github.com/Masterminds/vcs
symbols:
- BzrRepo.Get
- BzrRepo.Init
- BzrRepo.Ping
- BzrRepo.ExportDir
- GitRepo.Get
- GitRepo.Init
- GitRepo.Update
- HgRepo.Get
- HgRepo.Init
- HgRepo.Ping
- HgRepo.ExportDir
- NewSvnRepo
- SvnRepo.Get
- SvnRepo.Ping
- SvnRepo.ExportDir
derived_symbols:
- NewRepo
summary: Command injection in github.com/Masterminds/vcs
description: |-
Passing untrusted inputs to VCS functions can permit an attacker to execute
arbitrary commands.
The vcs package executes version control commands with user-provided arguments.
These arguments can be interpreted as command-line flags, which can be used to
perform command injection.
published: 2022-07-01T20:08:17Z
cves:
- CVE-2022-21235
ghsas:
- GHSA-6635-c626-vj4r
credits:
- Alessio Della Libera of Snyk Research Team
references:
- fix: https://github.com/Masterminds/vcs/pull/105
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2512.yaml
|
id: GO-2024-2512
modules:
- module: github.com/docker/docker
versions:
- fixed: 24.0.9+incompatible
- introduced: 25.0.0+incompatible
- fixed: 25.0.2+incompatible
vulnerable_at: 25.0.1+incompatible
packages:
- package: github.com/docker/docker/builder/dockerfile
skip_fix: fix error due to incompatible version
- package: github.com/docker/docker/daemon/containerd
symbols:
- localCache.GetCache
- imageCache.GetCache
- isMatch
skip_fix: fix error due to incompatible version
- package: github.com/docker/docker/daemon/images
symbols:
- ImageService.CreateImage
- ImageService.CommitImage
skip_fix: fix error due to incompatible version
- package: github.com/docker/docker/image
symbols:
- store.SetBuiltLocally
- store.IsBuiltLocally
skip_fix: fix error due to incompatible version
- package: github.com/docker/docker/image/cache
symbols:
- LocalImageCache.GetCache
- ImageCache.GetCache
- getLocalCachedImage
- compare
skip_fix: fix error due to incompatible version
- module: github.com/moby/moby
versions:
- fixed: 24.0.9+incompatible
- introduced: 25.0.0+incompatible
- fixed: 25.0.2+incompatible
packages:
- package: github.com/moby/moby/builder/dockerfile
skip_fix: fix error due to incompatible version
- package: github.com/moby/moby/daemon/containerd
symbols:
- localCache.GetCache
- imageCache.GetCache
- isMatch
skip_fix: fix error due to incompatible version
- package: github.com/moby/moby/daemon/images
symbols:
- ImageService.CreateImage
- ImageService.CommitImage
skip_fix: fix error due to incompatible version
- package: github.com/moby/moby/image
symbols:
- store.SetBuiltLocally
- store.IsBuiltLocally
skip_fix: fix error due to incompatible version
- package: github.com/moby/moby/image/cache
symbols:
- LocalImageCache.GetCache
- ImageCache.GetCache
- getLocalCachedImage
- compare
skip_fix: fix error due to incompatible version
summary: Classic builder cache poisoning in github.com/docker/docker
cves:
- CVE-2024-24557
ghsas:
- GHSA-xw73-rw38-6vjc
references:
- advisory: https://github.com/moby/moby/security/advisories/GHSA-xw73-rw38-6vjc
- fix: https://github.com/moby/moby/commit/3e230cfdcc989dc524882f6579f9e0dac77400ae
- fix: https://github.com/moby/moby/commit/fca702de7f71362c8d103073c7e4a1d0a467fadd
- fix: https://github.com/moby/moby/commit/fce6e0ca9bc000888de3daa157af14fa41fcd0ff
source:
id: GHSA-xw73-rw38-6vjc
created: 2024-07-01T15:02:00.395966-04:00
review_status: REVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2706.yaml
|
id: GO-2024-2706
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 9.3.0+incompatible
- fixed: 9.3.3+incompatible
- introduced: 9.4.0+incompatible
- fixed: 9.4.4+incompatible
- introduced: 9.5.0+incompatible
- fixed: 9.5.2+incompatible
vulnerable_at: 9.5.1+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- introduced: 8.1.0
- fixed: 8.1.11
vulnerable_at: 8.0.0-20240626145722-59998b0b8473
summary: Mattermost Server Improper Access Control in github.com/mattermost/mattermost-server
cves:
- CVE-2024-29221
ghsas:
- GHSA-w67v-ph4x-f48q
references:
- advisory: https://github.com/advisories/GHSA-w67v-ph4x-f48q
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-29221
- web: https://github.com/mattermost/mattermost/commit/0dc03fbc6e3c9afb14137e72ab3fa6f5a0125b9c
- web: https://github.com/mattermost/mattermost/commit/5cce9fed7363386afebd81a58fb5fab7d2729c8f
- web: https://github.com/mattermost/mattermost/commit/a5784f34ba6592c6454b8742f24af9d06279e347
- web: https://github.com/mattermost/mattermost/commit/dd3fe2991a70a41790d6bef5d31afc5957525f3c
- web: https://mattermost.com/security-updates
source:
id: GHSA-w67v-ph4x-f48q
created: 2024-06-26T14:00:22.694802-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0163.yaml
|
id: GO-2021-0163
modules:
- module: std
versions:
- fixed: 1.5.4
- introduced: 1.6.0-0
- fixed: 1.6.1
vulnerable_at: 1.6.0
packages:
- package: syscall
symbols:
- LoadLibrary
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Privilege escalation on Windows via malicious DLL in syscall
description: |-
Untrusted search path vulnerability on Windows related to LoadLibrary allows
local users to gain privileges via a malicious DLL in the current working
directory.
published: 2022-01-05T22:41:50Z
cves:
- CVE-2016-3958
references:
- fix: https://go.dev/cl/21428
- fix: https://go.googlesource.com/go/+/6a0bb87bd0bf0fdf8ddbd35f77a75ebd412f61b0
- report: https://go.dev/issue/14959
- web: https://groups.google.com/g/golang-announce/c/9eqIHqaWvck
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1053.yaml
|
id: GO-2022-1053
modules:
- module: github.com/supranational/blst
versions:
- introduced: 0.3.0
- fixed: 0.3.3
vulnerable_at: 0.3.2
packages:
- package: github.com/supranational/blst/bindings/go
summary: Incorrect signatures in github.com/supranational/blst
description: |-
Potential creation of an invalid signature from correct inputs.
Some inputs to the blst_fp_eucl_inverse function can produce incorrect outputs.
This could theoretically permit the creation of an invalid signature from
correct inputs.
ghsas:
- GHSA-x279-68rr-jp4p
references:
- advisory: https://github.com/advisories/GHSA-x279-68rr-jp4p
- fix: https://github.com/supranational/blst/commit/dd980e7f81397895705c49fcb4f52e485bb45e21
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0053.yaml
|
id: GO-2021-0053
modules:
- module: github.com/gogo/protobuf
versions:
- fixed: 1.3.2
vulnerable_at: 1.3.1
packages:
- package: github.com/gogo/protobuf/plugin/unmarshal
symbols:
- unmarshal.field
- unmarshal.Generate
summary: Panic due to improper input validation in github.com/gogo/protobuf
description: |-
Due to improper bounds checking, maliciously crafted input to generated
Unmarshal methods can cause an out-of-bounds panic. If parsing messages from
untrusted parties, this may be used as a denial of service vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2021-3121
ghsas:
- GHSA-c3h9-896r-86jm
references:
- fix: https://github.com/gogo/protobuf/commit/b03c65ea87cdc3521ede29f62fe3ce239267c1bc
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1826.yaml
|
id: GO-2023-1826
modules:
- module: github.com/moov-io/signedxml
versions:
- fixed: 1.1.0
vulnerable_at: 1.0.0
packages:
- package: github.com/moov-io/signedxml
symbols:
- Validator.Validate
summary: Signature validation bypass in github.com/moov-io/signedxml
description: |-
Signature validation canonicalizes the input XML document before validating the
signature. Parsing the uncanonicalized and canonicalized forms can produce
different results. An attacker can exploit this variation to bypass signature
validation.
Users of signature validation must only parse the canonicalized form of the
validated document. The Validator.Validate function does not return the
canonical form, and cannot be used safely. Users should only use the
Validator.ValidateReferences function and only parse the canonical form which it
returns.
The Validator.Validate function was removed in github.com/moov-io/signedxml
v1.1.0.
cves:
- CVE-2023-34205
ghsas:
- GHSA-jqvr-j2vg-gjrv
references:
- report: https://github.com/moov-io/signedxml/issues/23
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2667.yaml
|
id: GO-2024-2667
modules:
- module: github.com/argoproj/argo-cd/v2
versions:
- introduced: 2.4.0
- fixed: 2.8.14
- introduced: 2.9.0
- fixed: 2.9.10
- introduced: 2.10.0
- fixed: 2.10.5
vulnerable_at: 2.10.4
summary: Out of memory crash from malicious Helm registry in github.com/argoproj/argo-cd/v2
cves:
- CVE-2024-29893
ghsas:
- GHSA-jhwx-mhww-rgc3
references:
- advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-jhwx-mhww-rgc3
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0005.yaml
|
id: GO-2020-0005
modules:
- module: go.etcd.io/etcd
versions:
- fixed: 0.5.0-alpha.5.0.20200423152442-f4b650b51dc4
vulnerable_at: 0.5.0-alpha.5.0.20200422225029-2369cb367873
packages:
- package: go.etcd.io/etcd/wal
symbols:
- WAL.ReadAll
- decoder.decodeRecord
derived_symbols:
- Create
- Repair
- Verify
summary: Panic due to malformed WALs in go.etcd.io/etcd
description: |-
Malformed WALs can be constructed such that WAL.ReadAll can cause attempted out
of bounds reads, or creation of arbitrarily sized slices, which may be used as a
DoS vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-15106
- CVE-2020-15112
ghsas:
- GHSA-m332-53r6-2w93
- GHSA-p4g4-wgrh-qrg2
credits:
- Trail of Bits
references:
- fix: https://github.com/etcd-io/etcd/pull/11793
- fix: https://github.com/etcd-io/etcd/commit/f4b650b51dc4a53a8700700dc12e1242ac56ba07
- web: https://github.com/etcd-io/etcd/blob/master/security/SECURITY_AUDIT.pdf
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0534.yaml
|
id: GO-2022-0534
modules:
- module: github.com/runatlantis/atlantis
versions:
- fixed: 0.19.7
vulnerable_at: 0.19.6
packages:
- package: github.com/runatlantis/atlantis/server/controllers/events
symbols:
- DefaultGitlabRequestParserValidator.ParseAndValidate
summary: Timing attack in github.com/runatlantis/atlantis
description: |-
Validation of Gitlab requests can leak secrets.
The package github.com/runatlantis/atlantis/server/controllers/events uses a
non-constant time comparison for secrets while validating a Gitlab request. This
allows for a timing attack where an attacker can recover a secret and then forge
the request.
published: 2022-08-11T20:54:51Z
cves:
- CVE-2022-24912
ghsas:
- GHSA-jxqv-jcvh-7gr4
credits:
- cedws
references:
- fix: https://github.com/runatlantis/atlantis/pull/2392
- fix: https://github.com/runatlantis/atlantis/commit/48870911974adddaa4c99c8089e79b7d787fa820
- web: https://github.com/runatlantis/atlantis/issues/2391
- web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUNATLANTISATLANTISSERVERCONTROLLERSEVENTS-2950851
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2968.yaml
|
id: GO-2024-2968
modules:
- module: github.com/zitadel/zitadel
non_go_versions:
- introduced: 2.0.0
- fixed: 2.53.8
- introduced: 2.54.0
- fixed: 2.54.5
- introduced: 2.55.0
- fixed: 2.55.1
vulnerable_at: 1.87.5
summary: ZITADEL Vulnerable to Session Information Leakage in github.com/zitadel/zitadel
cves:
- CVE-2024-39683
ghsas:
- GHSA-cvw9-c57h-3397
references:
- advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-cvw9-c57h-3397
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39683
- fix: https://github.com/zitadel/zitadel/commit/4a262e42abac2208b02fefaf68ba1a5121649f04
- fix: https://github.com/zitadel/zitadel/commit/c2093ce01507ca8fc811609ff5d391693360c3da
- fix: https://github.com/zitadel/zitadel/commit/d04f208486a418a45b884b9ca8433e5ad9790d73
- fix: https://github.com/zitadel/zitadel/pull/8231
- report: https://github.com/zitadel/zitadel/issues/8213
- web: https://discord.com/channels/927474939156643850/1254096852937347153
- web: https://github.com/zitadel/zitadel/releases/tag/v2.53.8
- web: https://github.com/zitadel/zitadel/releases/tag/v2.54.5
- web: https://github.com/zitadel/zitadel/releases/tag/v2.55.1
source:
id: GHSA-cvw9-c57h-3397
created: 2024-07-08T13:24:14.455414-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1753.yaml
|
id: GO-2023-1753
modules:
- module: std
versions:
- fixed: 1.19.9
- introduced: 1.20.0-0
- fixed: 1.20.4
vulnerable_at: 1.20.3
packages:
- package: html/template
symbols:
- appendCmd
- htmlNospaceEscaper
derived_symbols:
- Template.Execute
- Template.ExecuteTemplate
summary: Improper handling of empty HTML attributes in html/template
description: |-
Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}")
executed with empty input can result in output with unexpected results when
parsed due to HTML normalization rules. This may allow injection of arbitrary
attributes into tags.
credits:
- Juho Nurminen of Mattermost
references:
- report: https://go.dev/issue/59722
- fix: https://go.dev/cl/491617
- web: https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU
cve_metadata:
id: CVE-2023-29400
cwe: 'CWE-74: Improper input validation'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0957.yaml
|
id: GO-2022-0957
modules:
- module: github.com/tidwall/gjson
versions:
- fixed: 1.6.5
vulnerable_at: 1.6.4
packages:
- package: github.com/tidwall/gjson
symbols:
- parseObject
- queryMatches
derived_symbols:
- Get
- GetBytes
- GetMany
- GetManyBytes
- Result.Get
summary: Denial of service via maliciously crafted JSON in github.com/tidwall/gjson
description: A maliciously crafted JSON input can cause a denial of service attack.
published: 2022-08-25T06:28:20Z
cves:
- CVE-2020-36066
ghsas:
- GHSA-wjm3-fq3r-5x46
references:
- fix: https://github.com/tidwall/match/commit/c2f534168b739a7ec1821a33839fb2f029f26bbc
- web: https://github.com/tidwall/gjson/commit/9f58baa7a613f89dfdc764c39e47fd3a15606153
- web: https://github.com/tidwall/gjson/issues/195
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1681.yaml
|
id: GO-2023-1681
modules:
- module: github.com/containers/podman/v4
versions:
- fixed: 4.4.2
vulnerable_at: 4.4.1
packages:
- package: github.com/containers/podman/v4/utils
symbols:
- CreateTarFromSrc
summary: Time-of-check time-of-use race condition in github.com/containers/podman/v4
description: |-
A Time-of-check Time-of-use (TOCTOU) flaw appears in this version of podman.
This issue may allow a malicious user to replace a normal file in a volume with
a symlink while exporting the volume, allowing for access to arbitrary files on
the host file system.
cves:
- CVE-2023-0778
ghsas:
- GHSA-qwqv-rqgf-8qh8
references:
- web: https://bugzilla.redhat.com/show_bug.cgi?id=2168256
- fix: https://github.com/containers/podman/pull/17528
- fix: https://github.com/containers/podman/pull/17532
- fix: https://github.com/containers/podman/commit/6ca857feb07a5fdc96fd947afef03916291673d8
- advisory: https://github.com/advisories/GHSA-qwqv-rqgf-8qh8
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2613.yaml
|
id: GO-2024-2613
modules:
- module: github.com/1Panel-dev/1Panel
versions:
- fixed: 1.10.1-lts
vulnerable_at: 1.9.6
summary: Unauthorized Console access in github.com/1Panel-dev/1Panel
description: |-
If the user attempts to access a secure entry point and intercepts with Burp,
they can get access to the console page. This access does not return data nor
allow modification operations.
cves:
- CVE-2024-27288
ghsas:
- GHSA-26w3-q4j8-4xjp
references:
- advisory: https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-26w3-q4j8-4xjp
- web: https://github.com/1Panel-dev/1Panel/releases/tag/v1.10.1-lts
- fix: https://github.com/1Panel-dev/1Panel/pull/4014
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2186.yaml
|
id: GO-2023-2186
modules:
- module: std
versions:
- fixed: 1.20.11
- introduced: 1.21.0-0
- fixed: 1.21.4
vulnerable_at: 1.21.3
packages:
- package: path/filepath
symbols:
- IsLocal
summary: Incorrect detection of reserved device names on Windows in path/filepath
description: |-
On Windows, The IsLocal function does not correctly detect reserved device names
in some cases.
Reserved names followed by spaces, such as "COM1 ", and reserved names "COM" and
"LPT" followed by superscript 1, 2, or 3, are incorrectly reported as local.
With fix, IsLocal now correctly reports these names as non-local.
references:
- report: https://go.dev/issue/63713
- fix: https://go.dev/cl/540277
- web: https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY
cve_metadata:
id: CVE-2023-45284
cwe: 'CWE-41: Improper Resolution of Path Equivalence'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2494.yaml
|
id: GO-2024-2494
modules:
- module: github.com/moby/buildkit
versions:
- fixed: 0.12.5
vulnerable_at: 0.12.4
packages:
- package: github.com/moby/buildkit/executor
symbols:
- MountStubsCleaner
fix_links:
- https://github.com/moby/buildkit/commit/00fe637d43aba66f0937f5bdf4b9fc96991794fd
summary: Host system modification in github.com/moby/buildkit
description: |-
A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the
feature that removes empty files created for the mountpoints into removing a
file outside the container, from the host system.
cves:
- CVE-2024-23652
ghsas:
- GHSA-4v98-7qmw-rqr8
credits:
- '@rmcnamara-snyk'
references:
- advisory: https://github.com/moby/buildkit/security/advisories/GHSA-4v98-7qmw-rqr8
- fix: https://github.com/moby/buildkit/pull/4603
- web: https://github.com/moby/buildkit/releases/tag/v0.12.5
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2444.yaml
|
id: GO-2024-2444
modules:
- module: github.com/mattermost/mattermost-server
vulnerable_at: 9.9.0+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- fixed: 8.1.7
vulnerable_at: 8.0.0-20240626184126-817e18414e41
summary: Mattermost allows demoted guests to change group names in github.com/mattermost/mattermost-server
cves:
- CVE-2023-50333
ghsas:
- GHSA-9w97-9rqx-8v4j
unknown_aliases:
- BIT-mattermost-2023-50333
- CGA-28fj-7rmv-xw55
references:
- advisory: https://github.com/advisories/GHSA-9w97-9rqx-8v4j
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-50333
- web: https://github.com/mattermost/mattermost/commit/61dd452fb2fcd3ac6f7b2e050f7f0a93a92d95fc
- web: https://mattermost.com/security-updates
source:
id: GHSA-9w97-9rqx-8v4j
created: 2024-06-26T16:12:41.49358-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0252.yaml
|
id: GO-2022-0252
modules:
- module: github.com/cloudflare/cfrpki
versions:
- fixed: 1.4.0
vulnerable_at: 1.3.0
packages:
- package: github.com/cloudflare/cfrpki/validator/lib
symbols:
- IPNet.GetRange
- ValidateIPCertificateList
- GetRangeIP
- ValidateIPRoaCertificateList
derived_symbols:
- DecodeROA
- DecoderConfig.DecodeROA
- RPKICertificate.ValidateIPCertificate
- RPKIROA.ValidateIPRoaCertificate
summary: Panic on misconfigured IP address in github.com/cloudflare/cfrpki
description: |-
OctoRPKI crashes when a repository returns an ROA with a IP address that
contains too many bits.
published: 2022-07-15T23:07:41Z
cves:
- CVE-2021-3911
ghsas:
- GHSA-w6ww-fmfx-2x22
credits:
- Koen van Hove
references:
- fix: https://github.com/cloudflare/cfrpki/commit/2882307febd66801de97b2a2ce4d93fe58132005
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1178.yaml
|
id: GO-2022-1178
modules:
- module: github.com/bradleyfalzon/ghinstallation
versions:
- fixed: 1.1.2-0.20210308182858-d24f14f8be70
vulnerable_at: 1.1.1
packages:
- package: github.com/bradleyfalzon/ghinstallation
symbols:
- Transport.refreshToken
- Transport.Token
derived_symbols:
- Transport.RoundTrip
summary: JWT leak in github.com/bradleyfalzon/ghinstallation
description: |-
Errors returned by ghinstallation.Transport can include the JWT used for the
failed operation. If the error is exposed to an untrusted party, this JWT could
be extracted and used to authenticate further requests.
cves:
- CVE-2022-39304
ghsas:
- GHSA-h4q8-96p6-jcgr
credits:
- '@Miskerest'
references:
- advisory: https://github.com/bradleyfalzon/ghinstallation/security/advisories/GHSA-h4q8-96p6-jcgr
- fix: https://github.com/bradleyfalzon/ghinstallation/commit/d24f14f8be70d94129d76026e8b0f4f9170c8c3e
- web: https://docs.github.com/en/developers/apps/building-github-apps/authenticating-with-github-apps#authenticating-as-an-installation
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0026.yaml
|
id: GO-2020-0026
modules:
- module: github.com/openshift/source-to-image
versions:
- fixed: 1.1.10-0.20180427153919-f5cbcbc5cc6f
vulnerable_at: 1.1.9
packages:
- package: github.com/openshift/source-to-image/pkg/tar
symbols:
- stiTar.ExtractTarStreamFromTarReader
- stiTar.extractLink
- New
derived_symbols:
- stiTar.ExtractTarStream
- stiTar.ExtractTarStreamWithLogging
summary: |-
Arbitrary file write via archive extraction in
github.com/openshift/source-to-image
description: |-
Due to improper path sanitization, archives containing relative file paths can
cause files to be written (or overwritten) outside of the target directory.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2018-1103
ghsas:
- GHSA-w55j-f7vx-6q37
references:
- fix: https://github.com/openshift/source-to-image/commit/f5cbcbc5cc6f8cc2f479a7302443bea407a700cb
- web: https://snyk.io/research/zip-slip-vulnerability
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0525.yaml
|
id: GO-2022-0525
modules:
- module: std
versions:
- fixed: 1.17.12
- introduced: 1.18.0-0
- fixed: 1.18.4
vulnerable_at: 1.18.3
packages:
- package: net/http
symbols:
- transferReader.parseTransferEncoding
summary: Improper sanitization of Transfer-Encoding headers in net/http
description: |-
The HTTP/1 client accepted some invalid Transfer-Encoding headers as indicating
a "chunked" encoding. This could potentially allow for request smuggling, but
only if combined with an intermediate server that also improperly failed to
reject the header as invalid.
published: 2022-07-25T17:34:18Z
credits:
- Zeyu Zhang (https://www.zeyu2001.com/)
references:
- fix: https://go.dev/cl/409874
- fix: https://go.googlesource.com/go/+/e5017a93fcde94f09836200bca55324af037ee5f
- report: https://go.dev/issue/53188
- fix: https://go.dev/cl/410714
- web: https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE
cve_metadata:
id: CVE-2022-1705
cwe: 'CWE-444: Inconsistent Interpretation of HTTP Requests (''HTTP Request Smuggling'')'
description: |-
Acceptance of some invalid Transfer-Encoding headers in the HTTP/1 client in
net/http before Go 1.17.12 and Go 1.18.4 allows HTTP request smuggling if
combined with an intermediate server that also improperly fails to reject the
header as invalid.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2855.yaml
|
id: GO-2024-2855
modules:
- module: github.com/grafana/grafana
non_go_versions:
- introduced: 7.0.0
- fixed: 8.5.14
- introduced: 9.0.0
- fixed: 9.1.8
vulnerable_at: 5.4.5+incompatible
summary: Grafana Plugin signature bypass in github.com/grafana/grafana
cves:
- CVE-2022-31123
ghsas:
- GHSA-rhxj-gh46-jvw8
unknown_aliases:
- BIT-grafana-2022-31123
references:
- advisory: https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-31123
- web: https://github.com/grafana/grafana/releases/tag/v9.1.8
- web: https://security.netapp.com/advisory/ntap-20221124-0002
source:
id: GHSA-rhxj-gh46-jvw8
created: 2024-06-04T14:27:06.393242-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1992.yaml
|
id: GO-2023-1992
modules:
- module: golang.org/x/crypto
versions:
- fixed: 0.0.0-20190424203555-c05e17bb3b2d
vulnerable_at: 0.0.0-20190422183909-d864b10871cd
packages:
- package: golang.org/x/crypto/openpgp/clearsign
symbols:
- Decode
summary: Misleading message verification in golang.org/x/crypto/openpgp/clearsign
description: |-
The clearsign package accepts some malformed messages, making it possible for an
attacker to trick a human user (but not a Go program) into thinking unverified
text is part of the message.
With fix, messages with malformed headers in the SIGNED MESSAGE section are
rejected.
cves:
- CVE-2019-11841
ghsas:
- GHSA-x3jr-pf6g-c48f
credits:
- Aida Mynzhasova (SEC Consult Vulnerability Lab)
references:
- fix: https://go-review.git.corp.google.com/c/crypto/+/173778
- fix: https://go.googlesource.com/crypto/+/c05e17bb3b2dca130fc919668a96b4bec9eb9442
- web: https://groups.google.com/d/msg/golang-openpgp/6vdgZoTgbIY/K6bBY9z3DAAJ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0563.yaml
|
id: GO-2022-0563
modules:
- module: github.com/filebrowser/filebrowser/v2
versions:
- fixed: 2.18.0
vulnerable_at: 2.17.2
packages:
- package: github.com/filebrowser/filebrowser/v2/http
symbols:
- NewHandler
summary: Cross-site request forgery in github.com/filebrowser/filebrowser/v2
description: |-
A Cross-Site Request Forgery vulnerability exists in Filebrowser that allows
attackers to create a backdoor user with admin privilege and get access to the
filesystem via a malicious HTML webpage that is sent to the victim.
published: 2022-02-05T00:00:31Z
cves:
- CVE-2021-46398
ghsas:
- GHSA-72wf-hwcq-65h9
credits:
- Febin
references:
- fix: https://github.com/filebrowser/filebrowser/commit/74b7cd8e81840537a8206317344f118093153e8d
- web: https://github.com/filebrowser/filebrowser/issues/1621
- web: https://systemweakness.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2454.yaml
|
id: GO-2024-2454
modules:
- module: github.com/lestrrat-go/jwx
versions:
- introduced: 1.0.8
- fixed: 1.2.28
vulnerable_at: 1.2.27
packages:
- package: github.com/lestrrat-go/jwx/jws
symbols:
- Message.UnmarshalJSON
- module: github.com/lestrrat-go/jwx/v2
versions:
- fixed: 2.0.19
vulnerable_at: 2.0.18
packages:
- package: github.com/lestrrat-go/jwx/v2/jws
symbols:
- Message.UnmarshalJSON
summary: Panic due to nil pointer dereference in github.com/lestrrat-go/jwx/v2
cves:
- CVE-2024-21664
ghsas:
- GHSA-pvcr-v8j8-j5q3
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21664
- fix: https://github.com/lestrrat-go/jwx/commit/0e8802ce6842625845d651456493e7c87625601f
- fix: https://github.com/lestrrat-go/jwx/commit/d69a721931a5c48b9850a42404f18e143704adcd
notes:
- This report covers issues 2454, for v2, and 2455, for v1.
- The earliest v1 version with the vulnerable symbol is v1.0.8.
- The fix for v1 was not known initially, the GHSA got updated later.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0189.yaml
|
id: GO-2022-0189
modules:
- module: cmd
versions:
- fixed: 1.10.6
- introduced: 1.11.0-0
- fixed: 1.11.3
vulnerable_at: 1.11.2
packages:
- package: cmd/go/internal/get
symbols:
- downloadPackage
skip_fix: 'TODO: revisit this reason (cant request explicit version v1.11.2 of standard library package cmd/go/internal/get'
summary: Remote command execution via "go get" with "-u" flag in cmd/go
description: |-
The "go get" command is vulnerable to remote code execution when executed with
the -u flag and the import path of a malicious Go package, or a package that
imports it directly or indirectly.
Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the
distinction is documented at
https://golang.org/cmd/go/#hdr-Module_aware_go_get).
Using custom domains, it's possible to arrange things so that a Git repository
is cloned to a folder named ".git" by using a vanity import path that ends with
"/.git". If the Git repository root contains a "HEAD" file, a "config" file, an
"objects" directory, a "refs" directory, with some work to ensure the proper
ordering of operations, "go get -u" can be tricked into considering the parent
directory as a repository root, and running Git commands on it. That will use
the "config" file in the original Git repository root for its configuration, and
if that config file contains malicious commands, they will execute on the system
running "go get -u".
Note that forbidding import paths with a .git element might not be sufficient to
mitigate this issue, as on certain systems there can be other aliases for VCS
state folders.
published: 2022-08-04T21:30:35Z
cves:
- CVE-2018-16873
credits:
- Etienne Stalmans of Heroku
references:
- fix: https://go.dev/cl/154101
- fix: https://go.googlesource.com/go/+/bc82d7c7db83487e05d7a88e06549d4ae2a688c3
- report: https://go.dev/issue/29230
- web: https://groups.google.com/g/golang-announce/c/Kw31K8G7Fi0
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2115.yaml
|
id: GO-2023-2115
modules:
- module: github.com/gofiber/fiber/v2
versions:
- fixed: 2.50.0
vulnerable_at: 2.49.2
packages:
- package: github.com/gofiber/fiber/v2/middleware/csrf
symbols:
- configDefault
- New
- CsrfFromParam
- CsrfFromForm
- CsrfFromCookie
- CsrfFromHeader
- CsrfFromQuery
- newManager
- manager.getRaw
- manager.setRaw
summary: CSRF token reuse vulnerability in github.com/gofiber/fiber/v2
description: |-
A cross-site request forgery vulnerability in this package can allow an attacker
to inject arbitrary values and forge malicious requests on behalf of a user. The
attacker may inject arbitrary values without any authentication, or perform
various malicious actions on behalf of an authenticated user, potentially
compromising the security and integrity of the application.
The vulnerability is caused by improper validation and enforcement of CSRF
tokens within the application. For 'safe' methods, the token is extracted from
the cookie and saved to storage without further validation or sanitization. In
addition, the CSRF token is validated against tokens in storage but not
associated with a session, nor by using a Double Submit Cookie Method, allowing
for token reuse.
cves:
- CVE-2023-45128
ghsas:
- GHSA-94w9-97p3-p368
references:
- advisory: https://github.com/gofiber/fiber/security/advisories/GHSA-94w9-97p3-p368
- fix: https://github.com/gofiber/fiber/commit/8c3916dbf4ad2ed427d02c6eb63ae8b2fa8f019a
- fix: https://github.com/gofiber/fiber/commit/b50d91d58ecdff2a330bf07950244b6c4caf65b1
notes:
- There is a closely related vulnerability (GO-2023-2116), and it is not clear which fix applies to which vulnerability, so I have marked both fixes as applying to both vulnerabilities.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2928.yaml
|
id: GO-2024-2928
modules:
- module: github.com/flipped-aurora/gin-vue-admin
versions:
- fixed: 2.6.6+incompatible
vulnerable_at: 2.6.5+incompatible
summary: SQL injection vulnerability in Gin-vue-admin in github.com/flipped-aurora/gin-vue-admin
cves:
- CVE-2024-37896
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37896
- fix: https://github.com/flipped-aurora/gin-vue-admin/commit/53d03382188868464ade489ab0713b54392d227f
- web: https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gf3r-h744-mqgp
source:
id: CVE-2024-37896
created: 2024-06-27T15:54:20.259992-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1526.yaml
|
id: GO-2023-1526
modules:
- module: github.com/hakobe/paranoidhttp
versions:
- fixed: 0.3.0
vulnerable_at: 0.2.0
packages:
- package: github.com/hakobe/paranoidhttp
symbols:
- safeAddr
summary: Server-side request forgery in github.com/hakobe/paranoidhttp
description: |-
Paranoidhttp before is vulnerable to SSRF because [::] is equivalent to the
127.0.0.1 address, but does not match the filter for private addresses.
cves:
- CVE-2023-24623
ghsas:
- GHSA-v9mp-j8g7-2q6m
references:
- web: https://github.com/hakobe/paranoidhttp/blob/master/CHANGELOG.md#v030-2023-01-19
- fix: https://github.com/hakobe/paranoidhttp/commit/07f671da14ce63a80f4e52432b32e8d178d75fd3
- web: https://github.com/hakobe/paranoidhttp/compare/v0.2.0...v0.3.0
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0254.yaml
|
id: GO-2022-0254
modules:
- module: github.com/ethereum/go-ethereum
versions:
- fixed: 1.10.8
vulnerable_at: 1.10.7
packages:
- package: github.com/ethereum/go-ethereum/core/vm
symbols:
- opCall
- opCallCode
- opDelegateCall
- opStaticCall
- EVMInterpreter.Run
derived_symbols:
- EVM.Call
- EVM.CallCode
- EVM.Create
- EVM.Create2
- EVM.DelegateCall
- EVM.StaticCall
summary: Consensus flaw during block processing in github.com/ethereum/go-ethereum
description: |-
A vulnerability in the Geth EVM can cause a node to reject the canonical chain.
A memory-corruption bug within the EVM can cause a consensus error, where
vulnerable nodes obtain a different stateRoot when processing a maliciously
crafted transaction. This, in turn, would lead to the chain being split in two
forks.
published: 2022-07-15T23:07:56Z
cves:
- CVE-2021-39137
ghsas:
- GHSA-9856-9gg9-qcmq
references:
- fix: https://github.com/ethereum/go-ethereum/pull/23381/commits/4d4879cafd1b3c906fc184a8c4a357137465128f
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1184.yaml
|
id: GO-2022-1184
modules:
- module: code.sajari.com/docconv
versions:
- introduced: 1.1.0
- fixed: 1.3.5
vulnerable_at: 1.3.4
packages:
- package: code.sajari.com/docconv
symbols:
- PDFHasImage
- ConvertPDF
derived_symbols:
- Convert
- ConvertPages
- ConvertPath
- ConvertPathReadability
summary: OS command injection vulnerability in code.sajari.com/docconv
description: |-
The manipulation of the argument path to docconv.{ConvertPDF,PDFHasImage} leads
to os command injection.
cves:
- CVE-2022-4643
ghsas:
- GHSA-6m4h-hfpp-x8cx
references:
- fix: https://github.com/sajari/docconv/pull/110
- web: https://github.com/sajari/docconv/releases/tag/v1.3.5
- fix: https://github.com/sajari/docconv/commit/b19021ade3d0b71c89d35cb00eb9e589a121faa5
- web: https://vuldb.com/?id.216502
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2903.yaml
|
id: GO-2024-2903
modules:
- module: github.com/evmos/evmos
vulnerable_at: 1.1.3
- module: github.com/evmos/evmos/v2
vulnerable_at: 2.0.2
- module: github.com/evmos/evmos/v3
vulnerable_at: 3.0.3
- module: github.com/evmos/evmos/v4
vulnerable_at: 4.0.2
- module: github.com/evmos/evmos/v5
vulnerable_at: 5.0.1
- module: github.com/evmos/evmos/v6
vulnerable_at: 6.0.4
- module: github.com/evmos/evmos/v7
vulnerable_at: 7.0.0
- module: github.com/evmos/evmos/v8
vulnerable_at: 8.2.3
- module: github.com/evmos/evmos/v9
vulnerable_at: 9.1.0
- module: github.com/evmos/evmos/v10
vulnerable_at: 10.0.1
- module: github.com/evmos/evmos/v11
vulnerable_at: 11.0.2
- module: github.com/evmos/evmos/v12
vulnerable_at: 12.1.6
- module: github.com/evmos/evmos/v13
vulnerable_at: 13.0.2
- module: github.com/evmos/evmos/v14
vulnerable_at: 14.1.0
- module: github.com/evmos/evmos/v15
vulnerable_at: 15.0.0
- module: github.com/evmos/evmos/v16
vulnerable_at: 16.0.4
- module: github.com/evmos/evmos/v17
vulnerable_at: 17.0.1
- module: github.com/evmos/evmos/v18
versions:
- fixed: 18.1.0
vulnerable_at: 18.0.1
summary: Contract balance not updating correctly after interchain transaction in github.com/evmos/evmos
cves:
- CVE-2024-37153
ghsas:
- GHSA-xgr7-jgq3-mhmc
references:
- advisory: https://github.com/evmos/evmos/security/advisories/GHSA-xgr7-jgq3-mhmc
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37153
- fix: https://github.com/evmos/evmos/commit/478b7a62e7af57a70cf3a01126c7f5a89bee69d7
source:
id: GHSA-xgr7-jgq3-mhmc
created: 2024-06-26T14:08:58.142641-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1732.yaml
|
id: GO-2023-1732
modules:
- module: github.com/bnb-chain/tss-lib
versions:
- fixed: 1.3.6-0.20230324145555-bb6fb30bd3eb
vulnerable_at: 1.3.5
packages:
- package: github.com/bnb-chain/tss-lib/common
- module: github.com/binance-chain/tss-lib
vulnerable_at: 1.3.0
packages:
- package: github.com/binance-chain/tss-lib/common
summary: |-
Timing attack from non-constant time scalar multiplication in
github.com/bnb-chain/tss-lib
description: |-
Timing attack from non-constant time scalar multiplication in
github.com/bnb-chain/tss-lib.
cves:
- CVE-2023-26556
references:
- advisory: https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1549.yaml
|
id: GO-2023-1549
modules:
- module: github.com/openshift/apiserver-library-go
versions:
- fixed: 0.0.0-20230119093715-30f75d79e424
vulnerable_at: 0.0.0-20221118165437-6006085c7412
packages:
- package: github.com/openshift/apiserver-library-go/pkg/securitycontextconstraints/seccomp
symbols:
- strategy.validateProfile
derived_symbols:
- strategy.ValidateContainer
- strategy.ValidatePod
summary: Improper input validation in github.com/openshift/apiserver-library-go
description: |-
Low-privileged users can set the seccomp profile for pods they control to
"unconfined."
By default, the seccomp profile used in the restricted-v2 Security Context
Constraint (SCC) is "runtime/default," allowing users to disable seccomp for
pods they can create and modify.
cves:
- CVE-2023-0229
ghsas:
- GHSA-5465-xc2j-6p84
references:
- advisory: https://github.com/advisories/GHSA-5465-xc2j-6p84
- fix: https://github.com/openshift/apiserver-library-go/pull/97
- fix: https://github.com/openshift/apiserver-library-go/commit/30f75d79e424ca462c6de53ee8b93f91183763e6
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2493.yaml
|
id: GO-2024-2493
modules:
- module: github.com/moby/buildkit
versions:
- fixed: 0.12.5
vulnerable_at: 0.12.4
packages:
- package: github.com/moby/buildkit/executor/oci
symbols:
- submounts.cleanup
- submounts.subMount
- sub
- package: github.com/moby/buildkit/snapshot
symbols:
- LocalMounterWithMounts
- localMounter.Mount
- LocalMounter
fix_links:
- https://github.com/moby/buildkit/commit/f781267af1acb688e94740e1fdc22c1bf587d7fd
summary: Host system file access in github.com/moby/buildkit
description: |-
Two malicious build steps running in parallel sharing the same cache mounts with
subpaths could cause a race condition that can lead to files from the host
system being accessible to the build container.
cves:
- CVE-2024-23651
ghsas:
- GHSA-m3r6-h7wv-7xxv
credits:
- '@rmcnamara-snyk'
references:
- fix: https://github.com/moby/buildkit/pull/4604
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2402.yaml
|
id: GO-2023-2402
modules:
- module: golang.org/x/crypto
versions:
- fixed: 0.17.0
vulnerable_at: 0.16.0
packages:
- package: golang.org/x/crypto/ssh
symbols:
- handshakeTransport.readLoop
- handshakeTransport.sendKexInit
- handshakeTransport.enterKeyExchange
- transport.readPacket
- connectionState.readPacket
- transport.writePacket
- connectionState.writePacket
derived_symbols:
- Client.Dial
- Client.DialContext
- Client.DialTCP
- Client.Listen
- Client.ListenTCP
- Client.ListenUnix
- Client.NewSession
- Dial
- DiscardRequests
- NewClient
- NewClientConn
- NewServerConn
- Request.Reply
- Session.Close
- Session.CombinedOutput
- Session.Output
- Session.RequestPty
- Session.RequestSubsystem
- Session.Run
- Session.SendRequest
- Session.Setenv
- Session.Shell
- Session.Signal
- Session.Start
- Session.WindowChange
- channel.Accept
- channel.Close
- channel.CloseWrite
- channel.Read
- channel.ReadExtended
- channel.Reject
- channel.SendRequest
- channel.Write
- channel.WriteExtended
- curve25519sha256.Client
- curve25519sha256.Server
- dhGEXSHA.Client
- dhGEXSHA.Server
- dhGroup.Client
- dhGroup.Server
- ecdh.Client
- ecdh.Server
- extChannel.Read
- extChannel.Write
- mux.OpenChannel
- mux.SendRequest
- sessionStdin.Close
- sshClientKeyboardInteractive.Challenge
- tcpListener.Accept
- tcpListener.Close
- unixListener.Accept
- unixListener.Close
summary: |-
Man-in-the-middle attacker can compromise integrity of secure channel in
golang.org/x/crypto
description: |-
A protocol weakness allows a MITM attacker to compromise the integrity of the
secure channel before it is established, allowing the attacker to prevent
transmission of a number of messages immediately after the secure channel is
established without either side being aware.
The impact of this attack is relatively limited, as it does not compromise
confidentiality of the channel. Notably this attack would allow an attacker to
prevent the transmission of the SSH2_MSG_EXT_INFO message, disabling a handful
of newer security features.
This protocol weakness was also fixed in OpenSSH 9.6.
cves:
- CVE-2023-48795
ghsas:
- GHSA-45x7-px36-x8w8
credits:
- Fabian Bäumer (Ruhr University Bochum)
- Marcus Brinkmann (Ruhr University Bochum)
- Jörg Schwenk (Ruhr University Bochum)
references:
- report: https://go.dev/issue/64784
- fix: https://go.dev/cl/550715
- fix: https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
- web: https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
- web: https://www.openssh.com/txt/release-9.6
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0106.yaml
|
id: GO-2021-0106
modules:
- module: github.com/whyrusleeping/tar-utils
versions:
- fixed: 0.0.0-20201201191210-20a61371de5b
vulnerable_at: 0.0.0-20201201182126-c528cc7df19d
packages:
- package: github.com/whyrusleeping/tar-utils
symbols:
- Extractor.outputPath
derived_symbols:
- Extractor.Extract
summary: Path traversal in github.com/whyrusleeping/tar-utils
description: |-
Due to improper path sanitization, archives containing relative file paths can
cause files to be written (or overwritten) outside of the target directory.
published: 2021-07-28T18:08:05Z
ghsas:
- GHSA-jpf8-h7h7-3ppm
references:
- fix: https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227
- web: https://snyk.io/research/zip-slip-vulnerability
cve_metadata:
id: CVE-2020-36566
cwe: 'CWE 22: Improper Limitation of a Pathname to a Restricted Directory (''Path Traversal'')'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2730.yaml
|
id: GO-2024-2730
modules:
- module: github.com/gorilla/sessions
vulnerable_at: 1.2.2
packages:
- package: github.com/gorilla/sessions
symbols:
- FilesystemStore.save
- FilesystemStore.load
- FilesystemStore.erase
derived_symbols:
- CookieStore.Get
- FilesystemStore.Get
- FilesystemStore.New
- FilesystemStore.Save
- Registry.Get
- Registry.Save
- Save
- Session.Save
summary: 'WITHDRAWN: Directory traversal in FilesystemStore in github.com/gorilla/sessions'
description: |-
(This report has been withdrawn on the grounds that it
generates too many false positives. Session IDs are
documented as not being suitable to hold user-provided
data.)
FilesystemStore does not sanitize the Session.ID value,
making it vulnerable to directory traversal attacks.
If an attacker has control over the contents of the session ID,
this can be exploited to write to arbitrary files in the
filesystem.
Programs which do not set session IDs explicitly,
or which only set session IDs that will not be
interpreted by the filesystem, are not vulnerable.
withdrawn: "2024-04-17T18:06:23Z"
related:
- CVE-2024-3400
references:
- fix: https://github.com/gorilla/sessions/pull/274
source:
id: go-security-team
created: 2024-04-17T07:45:30.470362-07:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2400.yaml
|
id: GO-2023-2400
modules:
- module: github.com/sap/cloud-security-client-go
versions:
- fixed: 0.17.0
vulnerable_at: 0.16.0
packages:
- package: github.com/sap/cloud-security-client-go/auth
symbols:
- matchesDomain
derived_symbols:
- Middleware.Authenticate
- Middleware.AuthenticateWithProofOfPossession
- package: github.com/sap/cloud-security-client-go/oidcclient
symbols:
- OIDCTenant.getJWKsFromServer
- OIDCTenant.performDiscovery
derived_symbols:
- NewOIDCTenant
- OIDCTenant.GetJWKs
- package: github.com/sap/cloud-security-client-go/tokenclient
symbols:
- TokenFlows.ClientCredentials
summary: Escalation of privileges in github.com/sap/cloud-security-client-go
description: |-
An unauthenticated attacker can obtain arbitrary permissions within the
application under certain conditions.
cves:
- CVE-2023-50424
ghsas:
- GHSA-92cg-ghq6-9587
- GHSA-m8rw-rcpq-2vp2
references:
- web: https://me.sap.com/notes/3411067
- web: https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
- web: https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067/
- advisory: https://github.com/SAP/cloud-security-services-integration-library/security/advisories/GHSA-59c9-pxq8-9c73
- fix: https://github.com/SAP/cloud-security-client-go/commit/2e3bd63e152e09f267316a1071034eb5d4b7f498
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2962.yaml
|
id: GO-2024-2962
modules:
- module: cmd
versions:
- fixed: 1.21.0-0
vulnerable_at: 1.20.14
packages:
- package: cmd/go
summary: Output of "go env" does not sanitize values in cmd/go
description: |-
Command go env is documented as outputting a shell script containing the Go
environment. However, go env doesn't sanitize values, so executing its output as
a shell script can cause various bad bahaviors, including executing arbitrary
commands or inserting new environment variables.
This issue is relatively minor because, in general, if an attacker can set
arbitrary environment variables on a system, they have better attack vectors
than making "go env" print them out.
credits:
- Hunter Wittenborn (https://hunterwittenborn.com/)
references:
- fix: https://go.dev/cl/488375
- fix: https://go.dev/cl/493535
- report: https://go.dev/issue/58508
- web: https://groups.google.com/g/golang-dev/c/ixHOFpSbajE/m/8EjlbKVWAwAJ
cve_metadata:
id: CVE-2023-24531
cwe: 'CWE-138: Improper Neutralization of Special Elements'
source:
id: go-security-team
created: 2024-07-02T12:32:20.378304-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2600.yaml
|
id: GO-2024-2600
modules:
- module: std
versions:
- fixed: 1.21.8
- introduced: 1.22.0-0
- fixed: 1.22.1
vulnerable_at: 1.22.0
packages:
- package: net/http
symbols:
- isDomainOrSubdomain
derived_symbols:
- Client.Do
- Client.Get
- Client.Head
- Client.Post
- Client.PostForm
- Get
- Head
- Post
- PostForm
- package: net/http/cookiejar
symbols:
- isIP
derived_symbols:
- Jar.Cookies
- Jar.SetCookies
summary: |-
Incorrect forwarding of sensitive headers and cookies on HTTP redirect in
net/http
description: |-
When following an HTTP redirect to a domain which is not a subdomain match or
exact match of the initial domain, an http.Client does not forward sensitive
headers such as "Authorization" or "Cookie". For example, a redirect from
foo.com to www.foo.com will forward the Authorization header, but a redirect to
bar.com will not.
A maliciously crafted HTTP redirect could cause sensitive headers to be
unexpectedly forwarded.
credits:
- Juho Nurminen of Mattermost
references:
- report: https://go.dev/issue/65065
- fix: https://go.dev/cl/569340
- web: https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg
cve_metadata:
id: CVE-2023-45289
cwe: 'CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer'
references:
- https://security.netapp.com/advisory/ntap-20240329-0006/
- http://www.openwall.com/lists/oss-security/2024/03/08/4
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2561.yaml
|
id: GO-2024-2561
modules:
- module: github.com/greenpau/caddy-security
unsupported_versions:
- last_affected: 1.1.23
vulnerable_at: 1.1.29
summary: Server-Side Request Forgery in github.com/greenpau/caddy-security
cves:
- CVE-2024-21498
ghsas:
- GHSA-93x8-66j2-wwr5
references:
- advisory: https://github.com/advisories/GHSA-93x8-66j2-wwr5
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21498
- report: https://github.com/greenpau/caddy-security/issues/269
- web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy
- web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249862
source:
id: GHSA-93x8-66j2-wwr5
created: 2024-06-14T11:42:01.981167-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1772.yaml
|
id: GO-2023-1772
modules:
- module: github.com/distribution/distribution
versions:
- fixed: 2.8.2-beta.1+incompatible
vulnerable_at: 2.8.1+incompatible
packages:
- package: github.com/distribution/distribution/registry/handlers
symbols:
- catalogHandler.GetCatalog
summary: Memory exhaustion in github.com/distribution/distribution
description: |-
Systems that run distribution built after a specific commit running on
memory-restricted environments can suffer from denial of service by a crafted
malicious /v2/_catalog API endpoint request.
cves:
- CVE-2023-2253
ghsas:
- GHSA-hqxw-f8mx-cpmw
references:
- fix: https://github.com/distribution/distribution/commit/f55a6552b006a381d9167e328808565dd2bf77dc
- advisory: https://github.com/advisories/GHSA-hqxw-f8mx-cpmw
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1095.yaml
|
id: GO-2022-1095
modules:
- module: std
versions:
- fixed: 1.18.8
- introduced: 1.19.0-0
- fixed: 1.19.3
vulnerable_at: 1.19.2
packages:
- package: syscall
goos:
- windows
symbols:
- StartProcess
- package: os/exec
goos:
- windows
symbols:
- Cmd.environ
- dedupEnv
- dedupEnvCase
derived_symbols:
- Cmd.CombinedOutput
- Cmd.Environ
- Cmd.Output
- Cmd.Run
- Cmd.Start
summary: Unsanitized NUL in environment variables on Windows in syscall and os/exec
description: |-
Due to unsanitized NUL values, attackers may be able to maliciously set
environment variables on Windows.
In syscall.StartProcess and os/exec.Cmd, invalid environment variable values
containing NUL values are not properly checked for. A malicious environment
variable value can exploit this behavior to set a value for a different
environment variable. For example, the environment variable string "A=B\x00C=D"
sets the variables "A=B" and "C=D".
credits:
- RyotaK (https://twitter.com/ryotkak)
references:
- report: https://go.dev/issue/56284
- fix: https://go.dev/cl/446916
- web: https://groups.google.com/g/golang-announce/c/mbHY1UY3BaM/m/hSpmRzk-AgAJ
cve_metadata:
id: CVE-2022-41716
cwe: 'CWE-158: Improper Neutralization of Null Byte or NUL Character'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1703.yaml
|
id: GO-2023-1703
modules:
- module: std
versions:
- fixed: 1.19.8
- introduced: 1.20.0-0
- fixed: 1.20.3
vulnerable_at: 1.20.2
packages:
- package: html/template
symbols:
- tJS
- tJSDelimited
derived_symbols:
- Template.Execute
- Template.ExecuteTemplate
summary: Backticks not treated as string delimiters in html/template
description: |-
Templates do not properly consider backticks (`) as Javascript string
delimiters, and do not escape them as expected.
Backticks are used, since ES6, for JS template literals. If a template contains
a Go template action within a Javascript template literal, the contents of the
action can be used to terminate the literal, injecting arbitrary Javascript code
into the Go template.
As ES6 template literals are rather complex, and themselves can do string
interpolation, the decision was made to simply disallow Go template actions from
being used inside of them (e.g. "var a = {{.}}"), since there is no obviously
safe way to allow this behavior. This takes the same approach as
github.com/google/safehtml.
With fix, Template.Parse returns an Error when it encounters templates like
this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but
will be exported in the release of Go 1.21.
Users who rely on the previous behavior can re-enable it using the GODEBUG flag
jstmpllitinterp=1, with the caveat that backticks will now be escaped. This
should be used with caution.
credits:
- Sohom Datta, Manipal Institute of Technology
references:
- report: https://go.dev/issue/59234
- fix: https://go.dev/cl/482079
- web: https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
cve_metadata:
id: CVE-2023-24538
cwe: 'CWE-94: Improper Control of Generation of Code (''Code Injection'')'
references:
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2684.yaml
|
id: GO-2024-2684
modules:
- module: github.com/ca17/teamsacs
unsupported_versions:
- last_affected: 1.0.2
vulnerable_at: 1.0.3
summary: CA17 TeamsACS Cross Site Scripting vulnerability in github.com/ca17/teamsacs
cves:
- CVE-2024-22780
ghsas:
- GHSA-hwvw-gh23-qpvq
references:
- advisory: https://github.com/advisories/GHSA-hwvw-gh23-qpvq
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-22780
- web: https://fuo.fi/CVE-2024-22780
- web: https://github.com/CA17/TeamsACS/issues/26
source:
id: GHSA-hwvw-gh23-qpvq
created: 2024-06-06T16:16:42.764735-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2791.yaml
|
id: GO-2024-2791
modules:
- module: github.com/cri-o/cri-o
versions:
- fixed: 1.27.6
- introduced: 1.28.0
- fixed: 1.28.6
- introduced: 1.29.0
- fixed: 1.29.4
vulnerable_at: 1.29.3
summary: CRI-O vulnerable to an arbitrary systemd property injection in github.com/cri-o/cri-o
cves:
- CVE-2024-3154
ghsas:
- GHSA-2cgq-h8xw-2v5j
references:
- advisory: https://github.com/cri-o/cri-o/security/advisories/GHSA-2cgq-h8xw-2v5j
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-3154
- web: https://access.redhat.com/security/cve/CVE-2024-3154
- web: https://bugzilla.redhat.com/show_bug.cgi?id=2272532
- web: https://github.com/opencontainers/runc/pull/4217
- web: https://github.com/opencontainers/runtime-spec/blob/main/features.md#unsafe-annotations-in-configjson
source:
id: GHSA-2cgq-h8xw-2v5j
created: 2024-05-17T16:10:42.126408-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0952.yaml
|
id: GO-2022-0952
modules:
- module: github.com/matrix-org/gomatrixserverlib
versions:
- fixed: 0.0.0-20220815091947-723fd495dde8
vulnerable_at: 0.0.0-20220812132423-6a49c18a298a
packages:
- package: github.com/matrix-org/gomatrixserverlib
symbols:
- NewPowerLevelContentFromEvent
derived_symbols:
- Allowed
- Event.PowerLevels
- EventsLoader.LoadAndVerify
- HeaderedReverseTopologicalOrdering
- NewPowerLevelContentFromAuthEvents
- RequestBackfill
- ResolveConflicts
- ResolveStateConflicts
- ResolveStateConflictsV2
- RespSendJoin.Check
- RespState.Check
- RespState.Events
- ReverseTopologicalOrdering
- VerifyAuthRulesAtState
- VerifyEventAuthChain
summary: Incorrect event parsing in github.com/matrix-org/gomatrixserverlib
description: |-
Power level parsing does not parse the "events_default" key of the
m.room.power_levels event, setting the event default power level to zero in all
cases. This can cause events to be improperly accepted or rejected in rooms
where the event_default power level has been changed.
published: 2022-08-22T18:08:50Z
cves:
- CVE-2022-36009
ghsas:
- GHSA-grvv-h2f9-7v9c
references:
- fix: https://github.com/matrix-org/gomatrixserverlib/commit/723fd495dde835d078b9f2074b6b62c06dea4575
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2752.yaml
|
id: GO-2024-2752
modules:
- module: code.gitea.io/gitea
versions:
- fixed: 1.16.5
vulnerable_at: 1.16.4
summary: Gitea Open Redirect in code.gitea.io/gitea
cves:
- CVE-2022-1058
ghsas:
- GHSA-4rqq-rxvc-v2rc
unknown_aliases:
- BIT-gitea-2022-1058
references:
- advisory: https://github.com/advisories/GHSA-4rqq-rxvc-v2rc
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-1058
- web: https://github.com/go-gitea/gitea/commit/e3d8e92bdc67562783de9a76b5b7842b68daeb48
- web: https://github.com/go-gitea/gitea/pull/19175
- web: https://github.com/go-gitea/gitea/pull/19186
- web: https://huntr.dev/bounties/4fb42144-ac70-4f76-a5e1-ef6b5e55dc0d
source:
id: GHSA-4rqq-rxvc-v2rc
created: 2024-05-17T16:12:33.556783-04:00
review_status: UNREVIEWED
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.