repo_id
stringclasses
927 values
file_path
stringlengths
99
214
content
stringlengths
2
4.15M
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0411.yaml
id: GO-2022-0411 modules: - module: github.com/Masterminds/goutils versions: - fixed: 1.1.1 vulnerable_at: 1.1.0 packages: - package: github.com/Masterminds/goutils symbols: - RandomAlphaNumeric - CryptoRandomAlphaNumeric summary: Insufficient randomness in github.com/Masterminds/goutils description: |- Randomly-generated alphanumeric strings contain significantly less entropy than expected. The RandomAlphaNumeric and CryptoRandomAlphaNumeric functions always return strings containing at least one digit from 0 to 9. This significantly reduces the amount of entropy in short strings generated by these functions. published: 2022-07-01T20:08:24Z ghsas: - GHSA-3839-6r69-m497 - GHSA-xg2h-wx96-xgxr references: - fix: https://github.com/Masterminds/goutils/commit/869801f20f9f1e7ecdbdb6422049d8241270d5e1 cve_metadata: id: CVE-2021-4238 cwe: 'CWE 330: Use of Insufficiently Random Values' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2568.yaml
id: GO-2024-2568 modules: - module: github.com/cilium/cilium versions: - fixed: 1.14.7 vulnerable_at: 1.14.6 summary: Unencrypted ingress/health traffic when using Wireguard transparent encryption in github.com/cilium/cilium cves: - CVE-2024-25630 ghsas: - GHSA-7496-fgv9-xw82 unknown_aliases: - BIT-cilium-2024-25630 - BIT-cilium-operator-2024-25630 - BIT-hubble-2024-25630 - BIT-hubble-relay-2024-25630 references: - advisory: https://github.com/cilium/cilium/security/advisories/GHSA-7496-fgv9-xw82 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-25630 - web: https://docs.cilium.io/en/stable/security/network/encryption-wireguard/#encryption-wg - web: https://github.com/cilium/cilium/releases/tag/v1.14.7 source: id: GHSA-7496-fgv9-xw82 created: 2024-06-05T13:39:06.463153-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0317.yaml
id: GO-2021-0317 modules: - module: std versions: - fixed: 1.16.14 - introduced: 1.17.0-0 - fixed: 1.17.7 vulnerable_at: 1.17.6 packages: - package: math/big symbols: - Rat.SetString skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Uncontrolled memory consumption in math/big description: |- Rat.SetString had an overflow issue that can lead to uncontrolled memory consumption. published: 2022-05-23T22:15:42Z cves: - CVE-2022-23772 credits: - Emmanuel Odeke references: - fix: https://go.dev/cl/379537 - fix: https://go.googlesource.com/go/+/ad345c265916bbf6c646865e4642eafce6d39e78 - web: https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ - report: https://go.dev/issue/50699 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1621.yaml
id: GO-2023-1621 modules: - module: std versions: - fixed: 1.19.7 - introduced: 1.20.0-0 - fixed: 1.20.2 vulnerable_at: 1.20.1 packages: - package: crypto/internal/nistec symbols: - P256Point.ScalarBaseMult - P256Point.ScalarMult - P256OrdInverse summary: Incorrect calculation on P256 curves in crypto/internal/nistec description: |- The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (a scalar larger than the order of the curve). This does not impact usages of crypto/ecdsa or crypto/ecdh. credits: - Guido Vranken, via the Ethereum Foundation bug bounty program references: - report: https://go.dev/issue/58647 - fix: https://go.dev/cl/471255 - web: https://groups.google.com/g/golang-announce/c/3-TpUx48iQY cve_metadata: id: CVE-2023-24532 cwe: 'CWE-682: Incorrect Calculation' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2853.yaml
id: GO-2024-2853 modules: - module: github.com/tg123/sshpiper versions: - introduced: 1.0.50 - fixed: 1.3.0 vulnerable_at: 1.2.8 summary: |- sshpiper's enabling of proxy protocol without proper feature flagging allows faking source address in github.com/tg123/sshpiper cves: - CVE-2024-35175 ghsas: - GHSA-4w53-6jvp-gg52 references: - advisory: https://github.com/tg123/sshpiper/security/advisories/GHSA-4w53-6jvp-gg52 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-35175 - fix: https://github.com/tg123/sshpiper/commit/2ddd69876a1e1119059debc59fe869cb4e754430 - fix: https://github.com/tg123/sshpiper/commit/70fb830dca26bea7ced772ce5d834a3e88ae7f53 source: id: GHSA-4w53-6jvp-gg52 created: 2024-05-17T16:09:07.811118-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0078.yaml
id: GO-2021-0078 modules: - module: golang.org/x/net versions: - fixed: 0.0.0-20180816102801-aaf60122140d vulnerable_at: 0.0.0-20180811021610-c39426892332 packages: - package: golang.org/x/net/html symbols: - inBodyIM - inFramesetIM derived_symbols: - Parse - ParseFragment summary: Panic when parsing malformed HTML in golang.org/x/net/html description: |- The HTML parser does not properly handle "in frameset" insertion mode, and can be made to panic when operating on malformed HTML that contains <template> tags. If operating on user input, this may be a vector for a denial of service attack. published: 2021-04-14T20:04:52Z cves: - CVE-2018-17075 ghsas: - GHSA-5p4h-3377-7w67 credits: - Kunpei Sakai references: - fix: https://go.dev/cl/123776 - fix: https://go.googlesource.com/net/+/aaf60122140d3fcf75376d319f0554393160eb50 - report: https://go.dev/issue/27016 - web: https://bugs.chromium.org/p/chromium/issues/detail?id=829668 - web: https://go-review.googlesource.com/c/net/+/94838/9/html/parse.go#1906 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0477.yaml
id: GO-2022-0477 modules: - module: std versions: - fixed: 1.17.11 - introduced: 1.18.0-0 - fixed: 1.18.3 vulnerable_at: 1.18.0 packages: - package: crypto/rand goos: - windows symbols: - Read summary: Indefinite hang with large buffers on Windows in crypto/rand description: |- On Windows, rand.Read will hang indefinitely if passed a buffer larger than 1 << 32 - 1 bytes. published: 2022-06-09T01:43:37Z credits: - Davis Goodin - Quim Muntal of Microsoft references: - fix: https://go.dev/cl/402257 - fix: https://go.googlesource.com/go/+/bb1f4416180511231de6d17a1f2f55c82aafc863 - report: https://go.dev/issue/52561 - web: https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ cve_metadata: id: CVE-2022-30634 cwe: 'CWE-835: Loop with Unreachable Exit Condition (''Infinite Loop'')' description: |- Infinite loop in Read in crypto/rand before Go 1.17.11 and Go 1.18.3 on Windows allows attacker to cause an indefinite hang by passing a buffer larger than 1 << 32 - 1 bytes. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0226.yaml
id: GO-2021-0226 modules: - module: std versions: - fixed: 1.14.8 - introduced: 1.15.0-0 - fixed: 1.15.1 vulnerable_at: 1.15.0 packages: - package: net/http/cgi symbols: - response.Write - response.WriteHeader - response.writeCGIHeader skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' - package: net/http/fcgi symbols: - response.Write - response.WriteHeader - response.writeCGIHeader skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Cross-site scripting in net/http/cgi and net/http/fcgi description: |- When a Handler does not explicitly set the Content-Type header, the the package would default to “text/html”, which could cause a Cross-Site Scripting vulnerability if an attacker can control any part of the contents of a response. The Content-Type header is now set based on the contents of the first Write using http.DetectContentType, which is consistent with the behavior of the net/http package. Although this protects some applications that validate the contents of uploaded files, not setting the Content-Type header explicitly on any attacker-controlled file is unsafe and should be avoided. published: 2022-01-13T03:44:58Z cves: - CVE-2020-24553 credits: - RedTeam Pentesting GmbH references: - fix: https://go.dev/cl/252179 - fix: https://go.googlesource.com/go/+/4f5cd0c0331943c7ec72df3b827d972584f77833 - web: https://groups.google.com/g/golang-announce/c/8wqlSbkLdPs - report: https://go.dev/issue/40928 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1874.yaml
id: GO-2023-1874 modules: - module: github.com/corazawaf/coraza/v2 vulnerable_at: 2.0.1 packages: - package: github.com/corazawaf/coraza/v2/bodyprocessors symbols: - multipartBodyProcessor.Read - module: github.com/corazawaf/coraza/v3 versions: - fixed: 3.0.1 vulnerable_at: 3.0.0 packages: - package: github.com/corazawaf/coraza/v3/internal/bodyprocessors symbols: - multipartBodyProcessor.ProcessRequest summary: Denial of service in github.com/corazawaf/coraza/v2 and v3 description: |- Due to the misuse of log.Fatalf, Coraza may crash after receiving crafted requests from attackers. cves: - CVE-2023-40586 ghsas: - GHSA-c2pj-v37r-2p6h credits: - rmb122 references: - advisory: https://github.com/corazawaf/coraza/security/advisories/GHSA-c2pj-v37r-2p6h - fix: https://github.com/corazawaf/coraza/commit/a5239ba3ce839e14d9b4f9486e1b4a403dcade8c - web: https://github.com/corazawaf/coraza/releases/tag/v3.0.1 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1201.yaml
id: GO-2022-1201 modules: - module: github.com/openshift/osin versions: - fixed: 1.0.2-0.20210113124101-8612686d6dda vulnerable_at: 1.0.1 packages: - package: github.com/openshift/osin symbols: - DefaultClient.ClientSecretMatches - CheckClientSecret derived_symbols: - Server.HandleAccessRequest - Server.HandleAuthorizeRequest summary: Timing attack in github.com/openshift/osin description: |- Client secret checks are vulnerable to timing attacks, which could permit an attacker to determine client secrets. cves: - CVE-2021-4294 ghsas: - GHSA-m7qp-cj9p-gj85 references: - fix: https://github.com/openshift/osin/pull/200 - fix: https://github.com/openshift/osin/commit/8612686d6dda34ae9ef6b5a974e4b7accb4fea29 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0503.yaml
id: GO-2022-0503 modules: - module: github.com/ipld/go-car versions: - fixed: 0.4.0 vulnerable_at: 0.3.3 packages: - package: github.com/ipld/go-car - package: github.com/ipld/go-car/util - module: github.com/ipld/go-car/v2 versions: - introduced: 2.0.0 - fixed: 2.4.0 vulnerable_at: 2.3.0 packages: - package: github.com/ipld/go-car/v2 - package: github.com/ipld/go-car/v2/blockstore - package: github.com/ipld/go-car/v2/index summary: Denial of service via malformed CAR data in github.com/ipld/go-car and go-car/v2 description: Decoding malformed CAR data can cause panics or excessive memory usage. published: 2022-07-30T03:50:50Z ghsas: - GHSA-9x4h-8wgm-8xfg references: - advisory: https://github.com/advisories/GHSA-9x4h-8wgm-8xfg review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2699.yaml
id: GO-2024-2699 modules: - module: github.com/jmorganca/ollama versions: - fixed: 0.1.29 vulnerable_at: 0.1.28 summary: Ollama DNS rebinding vulnerability in github.com/jmorganca/ollama cves: - CVE-2024-28224 ghsas: - GHSA-5jx5-hqx5-2vrj references: - advisory: https://github.com/advisories/GHSA-5jx5-hqx5-2vrj - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-28224 - web: https://github.com/ollama/ollama/releases - web: https://research.nccgroup.com/2024/04/08/technical-advisory-ollama-dns-rebinding-attack-cve-2024-28224 source: id: GHSA-5jx5-hqx5-2vrj created: 2024-06-06T16:17:36.326182-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2641.yaml
id: GO-2024-2641 modules: - module: github.com/go-vela/worker versions: - fixed: 0.23.2 vulnerable_at: 0.23.1 summary: Insecure Variable Substitution in Vela in github.com/go-vela/worker cves: - CVE-2024-28236 ghsas: - GHSA-pwx5-6wxg-px5h references: - advisory: https://github.com/go-vela/worker/security/advisories/GHSA-pwx5-6wxg-px5h - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-28236 - fix: https://github.com/go-vela/worker/commit/e1572743b008e4fbce31ebb1dcd23bf6a1a30297 source: id: GHSA-pwx5-6wxg-px5h created: 2024-05-17T16:14:41.981889-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0273.yaml
id: GO-2022-0273 modules: - module: std versions: - fixed: 1.16.8 - introduced: 1.17.0-0 - fixed: 1.17.1 vulnerable_at: 1.17.0 packages: - package: archive/zip symbols: - NewReader - OpenReader skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Panic due to crafted inputs in archive/zip description: |- The NewReader and OpenReader functions in archive/zip can cause a panic or an unrecoverable fatal error when reading an archive that claims to contain a large number of files, regardless of its actual size. This is caused by an incomplete fix for CVE-2021-33196. published: 2022-05-18T18:23:31Z cves: - CVE-2021-39293 credits: - OSS-Fuzz Project - Emmanuel Odeke references: - fix: https://go.dev/cl/343434 - fix: https://go.googlesource.com/go/+/bacbc33439b124ffd7392c91a5f5d96eca8c0c0b - report: https://go.dev/issue/47801 - web: https://groups.google.com/g/golang-announce/c/dx9d7IOseHw review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0082.yaml
id: GO-2021-0082 modules: - module: github.com/facebook/fbthrift versions: - fixed: 0.31.1-0.20200311080807-483ed864d69f vulnerable_at: 0.31.1-0.20200311052902-c8800899625e packages: - package: github.com/facebook/fbthrift/thrift/lib/go/thrift summary: |- Denial of service via malicious message size declaration in github.com/facebook/fbthrift description: |- Thrift Servers preallocate memory for the declared size of messages before checking the actual size of the message. This allows a malicious user to send messages that declare that they are significantly larger than they actually are, allowing them to force the server to allocate significant amounts of memory. This can be used as a denial of service vector. published: 2021-04-14T20:04:52Z cves: - CVE-2019-11939 ghsas: - GHSA-w3r9-r9w7-8h48 references: - fix: https://github.com/facebook/fbthrift/commit/483ed864d69f307e9e3b9dadec048216100c0757 - web: https://www.facebook.com/security/advisories/cve-2019-11939 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2052.yaml
id: GO-2023-2052 modules: - module: github.com/gofiber/fiber/v2 versions: - fixed: 2.49.2-0.20230906112033-b8c9ede6efa2 vulnerable_at: 2.49.1 packages: - package: github.com/gofiber/fiber/v2 symbols: - Ctx.isLocalHost derived_symbols: - Ctx.IsFromLocal summary: |- IsFromLocal local address check can be circumvented in github.com/gofiber/fiber/v2 description: |- The Ctx.IsFromLocal function can incorrectly report a request as being sent from localhost when the request contains an X-Forwarded-For header containing a localhost IP address. cves: - CVE-2023-41338 ghsas: - GHSA-3q5p-3558-364f references: - advisory: https://github.com/gofiber/fiber/security/advisories/GHSA-3q5p-3558-364f - fix: https://github.com/gofiber/fiber/commit/b8c9ede6efa231116c4bd8bb9d5e03eac1cb76dc review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1923.yaml
id: GO-2023-1923 modules: - module: github.com/mastercactapus/proxyprotocol versions: - fixed: 0.0.2 vulnerable_at: 0.0.1 packages: - package: github.com/mastercactapus/proxyprotocol symbols: - parseV2 derived_symbols: - Conn.LocalAddr - Conn.ProxyHeader - Conn.Read - Conn.RemoteAddr - Parse summary: |- Panic when handling invalid HAProxy PROXY v2 request in github.com/mastercactapus/proxyprotocol cves: - CVE-2019-14243 ghsas: - GHSA-85c5-ccm8-vr96 references: - advisory: https://github.com/advisories/GHSA-85c5-ccm8-vr96 - report: https://github.com/mastercactapus/proxyprotocol/issues/1 - fix: https://github.com/mastercactapus/proxyprotocol/commit/5c4a101121fc3e868026189c7a73f7f19eef90ac review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2746.yaml
id: GO-2024-2746 modules: - module: k8s.io/kubernetes versions: - fixed: 1.27.13 - introduced: 1.28.0 - fixed: 1.28.9 - introduced: 1.29.0 - fixed: 1.29.4 vulnerable_at: 1.29.3 packages: - package: k8s.io/kubernetes/plugin/pkg/admission/serviceaccount symbols: - Plugin.limitSecretReferences summary: |- Kubernetes allows bypassing mountable secrets policy imposed by the ServiceAccount admission plugin in k8s.io/kubernetes cves: - CVE-2024-3177 ghsas: - GHSA-pxhw-596r-rwq5 references: - advisory: https://github.com/advisories/GHSA-pxhw-596r-rwq5 - fix: https://github.com/kubernetes/kubernetes/commit/7c861b1ecad97e1ab9332c970c9294a72065111a - web: https://github.com/kubernetes/kubernetes/issues/124336 - web: https://groups.google.com/g/kubernetes-security-announce/c/JxjHf7fkVd8/m/oVCzypyOAQAJ source: id: GHSA-pxhw-596r-rwq5 created: 2024-05-17T16:12:44.610818-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2963.yaml
id: GO-2024-2963 modules: - module: std versions: - fixed: 1.21.12 - introduced: 1.22.0-0 - fixed: 1.22.5 vulnerable_at: 1.22.4 packages: - package: net/http symbols: - persistConn.readResponse derived_symbols: - Client.CloseIdleConnections - Client.Do - Client.Get - Client.Head - Client.Post - Client.PostForm - Get - Head - Post - PostForm - Transport.CancelRequest - Transport.CloseIdleConnections - Transport.RoundTrip summary: Denial of service due to improper 100-continue handling in net/http description: |- The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail. credits: - Geoff Franks references: - fix: https://go.dev/cl/591255 - report: https://go.dev/issue/67555 - web: https://groups.google.com/g/golang-dev/c/t0rK-qHBqzY/m/6MMoAZkMAgAJ cve_metadata: id: CVE-2024-24791 cwe: 'CWE 400: Uncontrolled Resource Consumption' source: id: go-security-team created: 2024-07-02T15:43:26.900923-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2432.yaml
id: GO-2024-2432 modules: - module: github.com/cubefs/cubefs non_go_versions: - fixed: 3.3.1 vulnerable_at: 2.5.2+incompatible summary: CubeFS timing attack can leak user passwords in github.com/cubefs/cubefs cves: - CVE-2023-46739 ghsas: - GHSA-8579-7p32-f398 references: - advisory: https://github.com/cubefs/cubefs/security/advisories/GHSA-8579-7p32-f398 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-46739 - fix: https://github.com/cubefs/cubefs/commit/6a0d5fa45a77ff20c752fa9e44738bf5d86c84bd - fix: https://github.com/cubefs/cubefs/commit/c21d034d2fcd051ffd64afeafc68cbcb39d26551 source: id: GHSA-8579-7p32-f398 created: 2024-06-14T11:34:40.709598-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2822.yaml
id: GO-2024-2822 modules: - module: github.com/tiagorlampert/CHAOS versions: - fixed: 0.0.0-20220716132853-b47438d36e3a vulnerable_at: 0.0.0-20220408031238-8963de253a5b packages: - package: github.com/tiagorlampert/CHAOS/services symbols: - clientService.BuildClient - package: github.com/tiagorlampert/CHAOS/delivery/http symbols: - httpController.generateBinaryPostHandler summary: Arbitrary code execution in github.com/tiagorlampert/CHAOS description: A remote attacker can execute arbitrary commands via crafted HTTP requests. cves: - CVE-2024-30850 - CVE-2024-33434 ghsas: - GHSA-p3j6-f45h-hw5f - GHSA-xfjj-f699-rc79 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-33434 - fix: https://github.com/tiagorlampert/CHAOS/pull/95 - fix: https://github.com/tiagorlampert/CHAOS/commit/1b451cf62582295b7225caf5a7b506f0bad56f6b - fix: https://github.com/tiagorlampert/CHAOS/commit/24c9e109b5be34df7b2bce8368eae669c481ed5e - web: https://gist.github.com/slimwang/d1ec6645ba9012a551ea436679244496 source: id: GHSA-xfjj-f699-rc79 created: 2024-05-08T20:07:33.796429-07:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2768.yaml
id: GO-2024-2768 modules: - module: github.com/rancher/rancher versions: - introduced: 2.0.0+incompatible non_go_versions: - fixed: 2.4.16 - introduced: 2.5.0 - fixed: 2.5.9 summary: |- Rancher does not properly specify ApiGroup when creating Kubernetes RBAC resources in github.com/rancher/rancher cves: - CVE-2021-25318 ghsas: - GHSA-f9xf-jq4j-vqw4 references: - advisory: https://github.com/advisories/GHSA-f9xf-jq4j-vqw4 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2021-25318 - report: https://github.com/rancher/rancher/issues/33590 - web: https://bugzilla.suse.com/show_bug.cgi?id=1184913 notes: - fix: 'github.com/rancher/rancher: could not add vulnerable_at: latest version (1.6.30) is before last introduced version' source: id: GHSA-f9xf-jq4j-vqw4 created: 2024-06-26T14:03:23.840942-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0033.yaml
id: GO-2020-0033 modules: - module: aahframe.work versions: - fixed: 0.12.4 vulnerable_at: 0.12.3 packages: - package: aahframe.work symbols: - HTTPEngine.Handle derived_symbols: - Application.Run - Application.ServeHTTP - Application.Start summary: Path Traversal in aahframe.work description: |- Due to improper sanitization of user input, HTTPEngine.Handle allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read. published: 2021-04-14T20:04:52Z ghsas: - GHSA-vp56-r7qv-783v credits: - '@snyff' references: - fix: https://github.com/go-aah/aah/pull/267 - fix: https://github.com/go-aah/aah/commit/881dc9f71d1f7a4e8a9a39df9c5c081d3a2da1ec - report: https://github.com/go-aah/aah/issues/266 cve_metadata: id: CVE-2020-36559 cwe: 'CWE 23: Relative Path Traversal' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2817.yaml
id: GO-2024-2817 modules: - module: github.com/karmada-io/karmada unsupported_versions: - last_affected: 1.9.0 vulnerable_at: 1.10.0 summary: karmada vulnerable to arbitrary code execution via a crafted command in github.com/karmada-io/karmada cves: - CVE-2024-33396 ghsas: - GHSA-wccg-v638-j9q2 references: - advisory: https://github.com/advisories/GHSA-wccg-v638-j9q2 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-33396 - web: https://gist.github.com/HouqiyuA/2b56a893c06553013982836abb77ba50 source: id: GHSA-wccg-v638-j9q2 created: 2024-06-04T14:27:43.925263-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0460.yaml
id: GO-2022-0460 modules: - module: github.com/pion/dtls/v2 versions: - fixed: 2.1.4 vulnerable_at: 2.1.3 packages: - package: github.com/pion/dtls/v2 symbols: - fragmentBuffer.pop derived_symbols: - Client - ClientWithContext - Dial - DialWithContext - Resume - Server - ServerWithContext - handshakeFSM.Run - listener.Accept summary: Infinite loop in github.com/pion/dtls/v2 description: |- An attacker can send packets that send the DTLS server or client into an infinite loop. published: 2022-07-01T20:07:34Z cves: - CVE-2022-29190 ghsas: - GHSA-cm8f-h6j3-p25c references: - fix: https://github.com/pion/dtls/commit/e0b2ce3592e8e7d73713ac67b363a2e192a4cecf review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0520.yaml
id: GO-2022-0520 modules: - module: std versions: - fixed: 1.17.12 - introduced: 1.18.0-0 - fixed: 1.18.4 vulnerable_at: 1.18.3 packages: - package: net/http symbols: - Header.Clone summary: Exposure of client IP addresses in net/http description: |- Client IP adresses may be unintentionally exposed via X-Forwarded-For headers. When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy sets the client IP as the value of the X-Forwarded-For header, contrary to its documentation. In the more usual case where a Director function sets the X-Forwarded-For header value to nil, ReverseProxy leaves the header unmodified as expected. published: 2022-07-28T17:23:05Z credits: - Christian Mehlmauer references: - fix: https://go.dev/cl/412857 - fix: https://go.googlesource.com/go/+/b2cc0fecc2ccd80e6d5d16542cc684f97b3a9c8a - report: https://go.dev/issue/53423 - web: https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE cve_metadata: id: CVE-2022-32148 cwe: 'CWE-200: Information Exposure' description: |- Improper exposure of client IP addresses in net/http before Go 1.17.12 and Go 1.18.4 can be triggered by calling httputil.ReverseProxy.ServeHTTP with a Request.Header map containing a nil value for the X-Forwarded-For header, which causes ReverseProxy to set the client IP as the value of the X-Forwarded-For header. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0224.yaml
id: GO-2021-0224 modules: - module: std versions: - fixed: 1.13.13 - introduced: 1.14.0-0 - fixed: 1.14.5 vulnerable_at: 1.14.4 packages: - package: net/http symbols: - expectContinueReader.Read skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Data race and crash in net/http description: |- HTTP servers where the Handler concurrently reads the request body and writes a response can encounter a data race and crash. The httputil.ReverseProxy Handler is affected. published: 2022-02-17T17:36:04Z cves: - CVE-2020-15586 credits: - Mikael Manukyan - Andrew Kutz - Dave McClure - Tim Downey - Clay Kauzlaric - Gabe Rosenhouse references: - fix: https://go.dev/cl/242598 - fix: https://go.googlesource.com/go/+/fa98f46741f818913a8c11b877520a548715131f - report: https://go.dev/issue/34902 - web: https://groups.google.com/g/golang-announce/c/XZNfaiwgt2w review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0621.yaml
id: GO-2022-0621 modules: - module: k8s.io/kube-state-metrics versions: - introduced: 1.7.0 - fixed: 1.7.2 vulnerable_at: 1.7.0 packages: - package: k8s.io/kube-state-metrics/internal/store symbols: - kubeAnnotationsToPrometheusLabels derived_symbols: - Builder.Build summary: Exposure of sensitive information in k8s.io/kube-state-metrics description: |- Exposing annotations as metrics can leak secrets. An experimental feature of kube-state-metrics enables annotations to be exposed as metrics. By default, metrics only expose metadata about secrets. However, a combination of the default kubectl behavior and this new feature can cause the entire secret content to end up in metric labels. published: 2021-05-18T15:38:54Z cves: - CVE-2019-10223 - CVE-2019-17110 ghsas: - GHSA-2v6x-frw8-7r7f - GHSA-c92w-72c5-9x59 credits: - Moritz S. references: - fix: https://github.com/kubernetes/kube-state-metrics/commit/03122fe3e2df49a9a7298b8af921d3c37c430f7f review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0072.yaml
id: GO-2021-0072 modules: - module: github.com/docker/distribution versions: - fixed: 2.7.0-rc.0+incompatible vulnerable_at: 2.6.2+incompatible vulnerable_at_requires: - github.com/Sirupsen/logrus@v1.0.6 packages: - package: github.com/docker/distribution/registry/handlers symbols: - copyFullPayload derived_symbols: - App.ServeHTTP - NewApp - blobUploadHandler.PatchBlobData - blobUploadHandler.PutBlobUploadComplete - catalogHandler.GetCatalog - imageManifestHandler.GetImageManifest - imageManifestHandler.PutImageManifest - package: github.com/docker/distribution/registry/storage symbols: - blobStore.Get derived_symbols: - PurgeUploads - Walk - blobStore.Enumerate - linkedBlobStore.Enumerate - linkedBlobStore.Get - manifestStore.Enumerate - manifestStore.Get - registry.Enumerate - registry.Repositories summary: Uncontrolled resource allocation in github.com/docker/distribution description: |- Various storage methods do not impose limits on how much content is accepted from user requests, allowing a malicious user to force the caller to allocate an arbitrary amount of memory. published: 2021-04-14T20:04:52Z cves: - CVE-2017-11468 ghsas: - GHSA-h62f-wm92-2cmw references: - fix: https://github.com/distribution/distribution/pull/2340 - fix: https://github.com/distribution/distribution/commit/91c507a39abfce14b5c8541cf284330e22208c0f - web: https://access.redhat.com/errata/RHSA-2017:2603 - web: http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00047.html review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0265.yaml
id: GO-2021-0265 modules: - module: github.com/tidwall/gjson versions: - fixed: 1.9.3 vulnerable_at: 1.9.2 packages: - package: github.com/tidwall/gjson symbols: - parseObject - queryMatches derived_symbols: - Get - GetBytes - GetMany - GetManyBytes - Result.Get summary: Denial of service via maliciously crafted path in github.com/tidwall/gjson description: |- A maliciously crafted path can cause Get and other query functions to consume excessive amounts of CPU and time. published: 2022-08-15T18:06:07Z cves: - CVE-2021-42248 - CVE-2021-42836 ghsas: - GHSA-c9gm-7rfj-8w5h - GHSA-ppj4-34rq-v8j9 references: - fix: https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96 - web: https://github.com/tidwall/gjson/issues/237 - web: https://github.com/tidwall/gjson/issues/236 - web: https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0462.yaml
id: GO-2022-0462 modules: - module: github.com/pion/dtls/v2 versions: - fixed: 2.1.5 vulnerable_at: 2.1.4 packages: - package: github.com/pion/dtls/v2 symbols: - flight4Parse derived_symbols: - Client - ClientWithContext - Dial - DialWithContext - Resume - Server - ServerWithContext - handshakeFSM.Run - listener.Accept summary: Improper validation of client certificates in github.com/pion/dtls/v2 description: |- Client-provided certificates are not correctly validated, and must not be trusted. DTLS client certificates must be accompanied by proof that the client possesses the private key for the certificate. The Pion DTLS server accepted client certificates unaccompanied by this proof, permitting an attacker to present any certificate and have it accepted as valid. published: 2022-07-01T20:07:12Z cves: - CVE-2022-29222 ghsas: - GHSA-w45j-f832-hxvh references: - fix: https://github.com/pion/dtls/commit/d2f797183a9f044ce976e6df6f362662ca722412 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2534.yaml
id: GO-2024-2534 modules: - module: github.com/rancher/apiserver versions: - fixed: 0.0.0-20240207153957-4fd7d821d952 vulnerable_at: 0.0.0-20240206174200-14e7493da5d3 packages: - package: github.com/rancher/apiserver/pkg/writer symbols: - HTMLResponseWriter.write derived_symbols: - HTMLResponseWriter.Write - HTMLResponseWriter.WriteList - package: github.com/rancher/apiserver/pkg/urlbuilder symbols: - ParseRequestURL derived_symbols: - New - NewPrefixed summary: Unauthenticated cross-site scripting in github.com/rancher/apiserver cves: - CVE-2023-32192 ghsas: - GHSA-833m-37f7-jq55 credits: - diego95root - kujalamathias references: - advisory: https://github.com/rancher/apiserver/security/advisories/GHSA-833m-37f7-jq55 - fix: https://github.com/rancher/apiserver/commit/4df268e250f625fa323349062636496e0aeff4e4 - fix: https://github.com/rancher/apiserver/commit/4e102cf0d07b1af3d10d82c3e5a751a869b8a6c7 - fix: https://github.com/rancher/apiserver/commit/4fd7d821d952510bfe38c9d4a3e2a65157f50525 - fix: https://github.com/rancher/apiserver/commit/69b3c2b56f3fa5a421889c533dada8cd08783cda - fix: https://github.com/rancher/apiserver/commit/97a10a30200cb851afd8ee85ee6b2295c4b6e5ee - fix: https://github.com/rancher/apiserver/commit/a3b9e3721c1b558ee63aec9594e37c223a5c8437 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2531.yaml
id: GO-2024-2531 modules: - module: github.com/1Panel-dev/1Panel versions: - fixed: 1.9.6 vulnerable_at: 1.9.5 summary: 1Panel set-cookie is missing the Secure keyword in github.com/1Panel-dev/1Panel cves: - CVE-2024-24768 ghsas: - GHSA-9xfw-jjq2-7v8h references: - advisory: https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-9xfw-jjq2-7v8h - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-24768 - fix: https://github.com/1Panel-dev/1Panel/commit/1169648162c4b9b48e0b4aa508f9dea4d6bc50d5 - fix: https://github.com/1Panel-dev/1Panel/pull/3817 source: id: GHSA-9xfw-jjq2-7v8h created: 2024-06-14T11:40:41.579857-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0300.yaml
id: GO-2022-0300 modules: - module: github.com/graph-gophers/graphql-go versions: - fixed: 1.3.0 vulnerable_at: 1.2.0 packages: - package: github.com/graph-gophers/graphql-go symbols: - Schema.ValidateWithVariables - Schema.exec - Schema.subscribe derived_symbols: - Schema.Exec - Schema.Subscribe - Schema.ToJSON - Schema.Validate summary: Panic via malicious inputs in github.com/graph-gophers/graphql-go description: |- Malicious inputs can cause a panic. A maliciously crafted input can cause a stack overflow and panic. Any user with access to the GraphQL can send such a query. This issue only occurs when using the graphql.MaxDepth schema option (which is highly recommended in most cases). published: 2022-07-15T23:10:20Z cves: - CVE-2022-21708 ghsas: - GHSA-mh3m-8c74-74xh references: - fix: https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2519.yaml
id: GO-2024-2519 modules: - module: github.com/grafana/grafana non_go_versions: - introduced: 6.0.0 - fixed: 7.2.1 vulnerable_at: 5.4.5+incompatible summary: Grafana world readable configuration files in github.com/grafana/grafana cves: - CVE-2020-12459 ghsas: - GHSA-m25m-5778-fm22 unknown_aliases: - BIT-grafana-2020-12459 references: - advisory: https://github.com/advisories/GHSA-m25m-5778-fm22 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-12459 - fix: https://github.com/grafana/grafana/commit/102448040d5132460e3b0013e03ebedec0677e00 - report: https://github.com/grafana/grafana/issues/8283 - web: https://access.redhat.com/security/cve/CVE-2020-12459 - web: https://bugzilla.redhat.com/show_bug.cgi?id=1827765 - web: https://bugzilla.redhat.com/show_bug.cgi?id=1829724 - web: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTQCKJZZYXMCSHJFZZ3YXEO5NUBANGZS - web: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEBCIEVSYIDDCA7FTRS2IFUOYLIQU34A - web: https://security.netapp.com/advisory/ntap-20200518-0004 - web: https://src.fedoraproject.org/rpms/grafana/c/fab93d67363eb0a9678d9faf160cc88237f26277 source: id: GHSA-m25m-5778-fm22 created: 2024-07-02T11:58:25.857462-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2905.yaml
id: GO-2024-2905 modules: - module: github.com/openshift/telemeter vulnerable_at: 3.11.0+incompatible summary: 'Openshift/telemeter: iss check during jwt authentication can be bypassed in github.com/openshift/telemeter' cves: - CVE-2024-5037 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-5037 - fix: https://github.com/kubernetes/kubernetes/pull/123540 - report: https://bugzilla.redhat.com/show_bug.cgi?id=2272339 - web: https://access.redhat.com/security/cve/CVE-2024-5037 - web: https://github.com/openshift/telemeter/blob/a9417a6062c3a31ed78c06ea3a0613a52f2029b2/pkg/authorize/jwt/client_authorizer.go#L78 source: id: CVE-2024-5037 created: 2024-06-27T15:54:56.792975-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2926.yaml
id: GO-2024-2926 modules: - module: github.com/evmos/evmos vulnerable_at: 1.1.3 - module: github.com/evmos/evmos/v2 vulnerable_at: 2.0.2 - module: github.com/evmos/evmos/v3 vulnerable_at: 3.0.3 - module: github.com/evmos/evmos/v4 vulnerable_at: 4.0.2 - module: github.com/evmos/evmos/v5 vulnerable_at: 5.0.1 - module: github.com/evmos/evmos/v6 vulnerable_at: 6.0.4 - module: github.com/evmos/evmos/v7 vulnerable_at: 7.0.0 - module: github.com/evmos/evmos/v8 vulnerable_at: 8.2.3 - module: github.com/evmos/evmos/v9 vulnerable_at: 9.1.0 - module: github.com/evmos/evmos/v10 vulnerable_at: 10.0.1 - module: github.com/evmos/evmos/v11 vulnerable_at: 11.0.2 - module: github.com/evmos/evmos/v12 vulnerable_at: 12.1.6 - module: github.com/evmos/evmos/v13 vulnerable_at: 13.0.2 - module: github.com/evmos/evmos/v14 vulnerable_at: 14.1.0 - module: github.com/evmos/evmos/v15 vulnerable_at: 15.0.0 - module: github.com/evmos/evmos/v16 vulnerable_at: 16.0.4 - module: github.com/evmos/evmos/v17 vulnerable_at: 17.0.1 - module: github.com/evmos/evmos/v18 versions: - fixed: 18.0.0 summary: Evmos is missing precompile checks in github.com/evmos/evmos cves: - CVE-2024-37158 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37158 - fix: https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb - web: https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v notes: - fix: 'github.com/evmos/evmos/v18: could not add vulnerable_at: could not find tagged version between introduced and fixed' source: id: CVE-2024-37158 created: 2024-06-27T15:54:31.357366-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2652.yaml
id: GO-2024-2652 modules: - module: github.com/argoproj/argo-cd/v2 versions: - fixed: 2.8.13 - introduced: 2.9.0 - fixed: 2.9.9 - introduced: 2.10.0 - fixed: 2.10.4 vulnerable_at: 2.10.3 packages: - package: github.com/argoproj/argo-cd/v2/util/session symbols: - SessionManager.updateFailureCount - getMaximumCacheSize derived_symbols: - SessionManager.VerifyUsernamePassword summary: Brute force protection bypass in github.com/argoproj/argo-cd/v2 description: |- An attacker can effectively bypass the rate limit and brute force protections in Argo CD by exploiting the application's weak cache-based mechanism. The application's brute force protection relies on a cache mechanism that tracks login attempts for each user. An attacker can overflow this cache by bombarding it with login attempts for different users, thereby pushing out the admin account's failed attempts and effectively resetting the rate limit for that account. cves: - CVE-2024-21662 - CVE-2024-21652 ghsas: - GHSA-2vgg-9h6w-m454 - GHSA-x32m-mvfj-52xv credits: - '@nadava669' - '@pasha-codefresh' - '@crenshaw-dev' - '@todaywasawesome' - '@jannfis' references: - fix: https://github.com/argoproj/argo-cd/commit/17b0df1168a4c535f6f37e95f25ed7cd81e1fa4d - fix: https://github.com/argoproj/argo-cd/commit/6e181d72b31522f886a2afa029d5b26d7912ec7b - fix: https://github.com/argoproj/argo-cd/commit/cebb6538f7944c87ca2fecb5d17f8baacc431456 - web: https://argo-cd.readthedocs.io/en/stable/security_considerations/#cve-2020-8827-insufficient-anti-automationanti-brute-force review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2704.yaml
id: GO-2024-2704 modules: - module: github.com/hashicorp/consul versions: - introduced: 1.16.0 - fixed: 1.16.1 vulnerable_at: 1.16.0 summary: |- Consul JWT Auth in L7 Intentions Allow for Mismatched Service Identity and JWT Providers in github.com/hashicorp/consul cves: - CVE-2023-3518 ghsas: - GHSA-9rhf-q362-77mx unknown_aliases: - BIT-consul-2023-3518 references: - advisory: https://github.com/advisories/GHSA-9rhf-q362-77mx - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-3518 - web: https://discuss.hashicorp.com/t/hcsec-2023-25-consul-jwt-auth-in-l7-intentions-allow-for-mismatched-service-identity-and-jwt-providers/57004 source: id: GHSA-9rhf-q362-77mx created: 2024-05-17T16:13:44.520242-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2649.yaml
id: GO-2024-2649 modules: - module: github.com/go-vela/types versions: - fixed: 0.23.2 vulnerable_at: 0.23.1 summary: Types for Vela Insecure Variable Substitution in github.com/go-vela/types ghsas: - GHSA-7v38-w32m-wx4m references: - advisory: https://github.com/go-vela/types/security/advisories/GHSA-7v38-w32m-wx4m - fix: https://github.com/go-vela/types/commit/2e046fceb8fe56fb7170495962f24475cee78d46 source: id: GHSA-7v38-w32m-wx4m created: 2024-05-17T16:14:31.393087-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2428.yaml
id: GO-2024-2428 modules: - module: k8s.io/ingress-nginx non_go_versions: - fixed: 1.9.0 vulnerable_at: 1.0.0-alpha.1 summary: |- Ingress-nginx code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation in k8s.io/ingress-nginx cves: - CVE-2023-5044 ghsas: - GHSA-fp9f-44c2-cw27 unknown_aliases: - BIT-nginx-ingress-controller-2023-5044 references: - advisory: https://github.com/advisories/GHSA-fp9f-44c2-cw27 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-5044 - web: http://www.openwall.com/lists/oss-security/2023/10/25/3 - web: https://github.com/kubernetes/ingress-nginx/issues/10572 - web: https://groups.google.com/g/kubernetes-security-announce/c/ukuYYvRNel0 - web: https://security.netapp.com/advisory/ntap-20240307-0012 source: id: GHSA-fp9f-44c2-cw27 created: 2024-06-14T11:34:12.417676-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0102.yaml
id: GO-2021-0102 modules: - module: code.cloudfoundry.org/gorouter versions: - fixed: 0.0.0-20191101214924-b1b5c44e050f vulnerable_at: 0.0.0-20191101214739-a658664ae1e3 packages: - package: code.cloudfoundry.org/gorouter/common/secure symbols: - AesGCM.Decrypt - module: github.com/cloudfoundry/gorouter versions: - fixed: 0.0.0-20191101214924-b1b5c44e050f vulnerable_at: 0.0.0-20191101214739-a658664ae1e3 packages: - package: github.com/cloudfoundry/gorouter/common/secure symbols: - AesGCM.Decrypt summary: Panic in decryption in code.cloudfoundry.org/gorouter description: |- Due to improper input validation, a maliciously crafted input can cause a panic, due to incorrect nonce size. If this package is used to decrypt user supplied messages without checking the size of supplied nonces, this may be used as a vector for a denial of service attack. published: 2021-07-28T18:08:05Z cves: - CVE-2019-11289 ghsas: - GHSA-5796-p3m6-9qj4 references: - fix: https://github.com/cloudfoundry/gorouter/commit/b1b5c44e050f73b399b379ca63a42a2c5780a83f - web: https://www.cloudfoundry.org/blog/cve-2019-11289/ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0526.yaml
id: GO-2022-0526 modules: - module: std versions: - fixed: 1.17.12 - introduced: 1.18.0-0 - fixed: 1.18.4 vulnerable_at: 1.18.3 packages: - package: encoding/gob symbols: - Decoder.decIgnoreOpFor - Decoder.compileIgnoreSingle - Decoder.compileDec summary: Stack exhaustion when decoding certain messages in encoding/gob description: |- Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. published: 2022-07-20T20:52:17Z references: - fix: https://go.dev/cl/417064 - fix: https://go.googlesource.com/go/+/6fa37e98ea4382bf881428ee0c150ce591500eb7 - report: https://go.dev/issue/53615 - web: https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE cve_metadata: id: CVE-2022-30635 cwe: 'CWE-674: Uncontrolled Recursion' description: |- Uncontrolled recursion in Decoder.Decode in encoding/gob before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a message which contains deeply nested structures. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2783.yaml
id: GO-2024-2783 modules: - module: github.com/IBAX-io/go-ibax versions: - fixed: 1.4.2 vulnerable_at: 1.4.0 summary: IBAX go-ibax vulnerable to SQL injection in github.com/IBAX-io/go-ibax cves: - CVE-2022-3800 ghsas: - GHSA-rwcf-gq22-ph83 references: - advisory: https://github.com/advisories/GHSA-rwcf-gq22-ph83 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-3800 - fix: https://github.com/IBAX-io/go-ibax/commit/b0183d8e550836dc50282ee74ff421ee41b25a37 - report: https://github.com/IBAX-io/go-ibax/issues/2061 - web: https://vuldb.com/?id.212636 source: id: GHSA-rwcf-gq22-ph83 created: 2024-06-04T17:58:37.976778-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2825.yaml
id: GO-2024-2825 modules: - module: cmd versions: - fixed: 1.21.10 - introduced: 1.22.0-0 - fixed: 1.22.3 vulnerable_at: 1.22.2 packages: - package: cmd/go goos: - darwin summary: Arbitrary code execution during build on Darwin in cmd/go description: |- On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a "#cgo LDFLAGS" directive. credits: - Juho Forsén (Mattermost) references: - report: https://go.dev/issue/67119 - fix: https://go.dev/cl/583815 - web: https://groups.google.com/g/golang-announce/c/wkkO4P9stm0 cve_metadata: id: CVE-2024-24787 cwe: 'CWE 74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (''Injection'')' references: - https://security.netapp.com/advisory/ntap-20240531-0006/ - http://www.openwall.com/lists/oss-security/2024/05/08/3 source: id: go-security-team created: 2024-05-07T16:50:09.179876-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0316.yaml
id: GO-2022-0316 modules: - module: github.com/open-policy-agent/opa versions: - introduced: 0.33.1 - fixed: 0.37.2 vulnerable_at: 0.33.1 packages: - package: github.com/open-policy-agent/opa/format symbols: - groupIterable derived_symbols: - Ast - MustAst - Source summary: Incorrect calculation in github.com/open-policy-agent/opa description: |- Pretty-printing an AST that contains synthetic nodes can change the logic of some statements by reordering array literals. published: 2022-07-27T20:27:33Z cves: - CVE-2022-23628 ghsas: - GHSA-hcw3-j74m-qc58 references: - advisory: https://github.com/open-policy-agent/opa/security/advisories/GHSA-hcw3-j74m-qc58 - fix: https://github.com/open-policy-agent/opa/commit/932e4ffc37a590ace79e9b75ca4340288c220239 - web: https://github.com/open-policy-agent/opa/commit/2bd8edab9e10e2dc9cf76ae8335ced0c224f3055 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1595.yaml
id: GO-2023-1595 modules: - module: filippo.io/nistec versions: - fixed: 0.0.2 vulnerable_at: 0.0.1 packages: - package: filippo.io/nistec goarch: - amd64 - arm64 - ppc64le - s390x symbols: - p256OrdInverse - P256Point.ScalarBaseMult - P256Point.ScalarMult summary: Incorrect multiplication of unreduced P-256 scalars in filippo.io/nistec description: |- Multiplication of certain unreduced P-256 scalars produce incorrect results. There are no protocols known at this time that can be attacked due to this. ghsas: - GHSA-f6hc-9g49-xmx7 credits: - Guido Vranken via the Ethereum Foundation bug bounty program references: - report: https://go.dev/issue/58647 - fix: https://github.com/FiloSottile/nistec/commit/c58aa1223ccf3943513e1e661cebce95af137244 cve_metadata: id: CVE-2023-24533 cwe: 'CWE-682: Incorrect Calculation' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0004.yaml
id: GO-2020-0004 modules: - module: github.com/nanobox-io/golang-nanoauth versions: - introduced: 0.0.0-20160722212129-ac0cc4484ad4 - fixed: 0.0.0-20200131131040-063a3fb69896 vulnerable_at: 0.0.0-20190311151057-c2ebbac481bb packages: - package: github.com/nanobox-io/golang-nanoauth symbols: - Auth.ServeHTTP - Auth.ListenAndServeTLS - Auth.ListenAndServe derived_symbols: - ListenAndServe - ListenAndServeTLS summary: Authentication bypass in github.com/nanobox-io/golang-nanoauth description: |- If any of the ListenAndServe functions are called with an empty token, token authentication is disabled globally for all listeners. Also, a minor timing side channel was present allowing attackers with very low latency and able to make many requests to potentially recover the token. published: 2021-04-14T20:04:52Z ghsas: - GHSA-hrm3-3xm6-x33h credits: - '@bouk' references: - fix: https://github.com/nanobox-io/golang-nanoauth/pull/5 - fix: https://github.com/nanobox-io/golang-nanoauth/commit/063a3fb69896acf985759f0fe3851f15973993f3 cve_metadata: id: CVE-2020-36569 cwe: 'CWE-305: Authentication Bypass by Primary Weakness' description: |- Authentication is globally bypassed in github.com/nanobox-io/golang-nanoauth between v0.0.0-20160722212129-ac0cc4484ad4 and v0.0.0-20200131131040-063a3fb69896 if ListenAndServe is called with an empty token. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2564.yaml
id: GO-2024-2564 modules: - module: github.com/greenpau/caddy-security unsupported_versions: - last_affected: 1.1.23 vulnerable_at: 1.1.29 summary: Improper Validation of Array Index in github.com/greenpau/caddy-security cves: - CVE-2024-21493 ghsas: - GHSA-8h95-jcp5-pjpr references: - advisory: https://github.com/advisories/GHSA-8h95-jcp5-pjpr - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21493 - report: https://github.com/greenpau/caddy-security/issues/263 - web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy - web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-5961078 source: id: GHSA-8h95-jcp5-pjpr created: 2024-06-14T11:42:16.399855-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0209.yaml
id: GO-2022-0209 modules: - module: golang.org/x/crypto versions: - fixed: 0.0.0-20190320223903-b7391e95e576 vulnerable_at: 0.0.0-20190313024323-a1f597ede03a packages: - package: golang.org/x/crypto/salsa20/salsa goarch: - amd64 symbols: - XORKeyStream summary: Insufficiently random values in golang.org/x/crypto/salsa20 description: |- XORKeyStream generates incorrect and insecure output for very large inputs. If more than 256 GiB of keystream is generated, or if the counter otherwise grows greater than 32 bits, the amd64 implementation will first generate incorrect output, and then cycle back to previously generated keystream. Repeated keystream bytes can lead to loss of confidentiality in encryption applications, or to predictability in CSPRNG applications. The issue might affect uses of golang.org/x/crypto/nacl with extremely large messages. Architectures other than amd64 and uses that generate less than 256 GiB of keystream for a single salsa20.XORKeyStream invocation are unaffected. published: 2022-07-01T20:15:25Z cves: - CVE-2019-11840 ghsas: - GHSA-r5c5-pr8j-pfp7 credits: - Michael McLoughlin references: - fix: https://go.dev/cl/168406 - fix: https://go.googlesource.com/crypto/+/b7391e95e576cacdcdd422573063bc057239113d - report: https://go.dev/issue/30965 - web: https://groups.google.com/g/golang-announce/c/tjyNcJxb2vQ/m/n0NRBziSCAAJ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0414.yaml
id: GO-2022-0414 modules: - module: github.com/Masterminds/vcs versions: - fixed: 1.13.3 vulnerable_at: 1.13.1 packages: - package: github.com/Masterminds/vcs symbols: - BzrRepo.Get - BzrRepo.Init - BzrRepo.Ping - BzrRepo.ExportDir - GitRepo.Get - GitRepo.Init - GitRepo.Update - HgRepo.Get - HgRepo.Init - HgRepo.Ping - HgRepo.ExportDir - NewSvnRepo - SvnRepo.Get - SvnRepo.Ping - SvnRepo.ExportDir derived_symbols: - NewRepo summary: Command injection in github.com/Masterminds/vcs description: |- Passing untrusted inputs to VCS functions can permit an attacker to execute arbitrary commands. The vcs package executes version control commands with user-provided arguments. These arguments can be interpreted as command-line flags, which can be used to perform command injection. published: 2022-07-01T20:08:17Z cves: - CVE-2022-21235 ghsas: - GHSA-6635-c626-vj4r credits: - Alessio Della Libera of Snyk Research Team references: - fix: https://github.com/Masterminds/vcs/pull/105 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2512.yaml
id: GO-2024-2512 modules: - module: github.com/docker/docker versions: - fixed: 24.0.9+incompatible - introduced: 25.0.0+incompatible - fixed: 25.0.2+incompatible vulnerable_at: 25.0.1+incompatible packages: - package: github.com/docker/docker/builder/dockerfile skip_fix: fix error due to incompatible version - package: github.com/docker/docker/daemon/containerd symbols: - localCache.GetCache - imageCache.GetCache - isMatch skip_fix: fix error due to incompatible version - package: github.com/docker/docker/daemon/images symbols: - ImageService.CreateImage - ImageService.CommitImage skip_fix: fix error due to incompatible version - package: github.com/docker/docker/image symbols: - store.SetBuiltLocally - store.IsBuiltLocally skip_fix: fix error due to incompatible version - package: github.com/docker/docker/image/cache symbols: - LocalImageCache.GetCache - ImageCache.GetCache - getLocalCachedImage - compare skip_fix: fix error due to incompatible version - module: github.com/moby/moby versions: - fixed: 24.0.9+incompatible - introduced: 25.0.0+incompatible - fixed: 25.0.2+incompatible packages: - package: github.com/moby/moby/builder/dockerfile skip_fix: fix error due to incompatible version - package: github.com/moby/moby/daemon/containerd symbols: - localCache.GetCache - imageCache.GetCache - isMatch skip_fix: fix error due to incompatible version - package: github.com/moby/moby/daemon/images symbols: - ImageService.CreateImage - ImageService.CommitImage skip_fix: fix error due to incompatible version - package: github.com/moby/moby/image symbols: - store.SetBuiltLocally - store.IsBuiltLocally skip_fix: fix error due to incompatible version - package: github.com/moby/moby/image/cache symbols: - LocalImageCache.GetCache - ImageCache.GetCache - getLocalCachedImage - compare skip_fix: fix error due to incompatible version summary: Classic builder cache poisoning in github.com/docker/docker cves: - CVE-2024-24557 ghsas: - GHSA-xw73-rw38-6vjc references: - advisory: https://github.com/moby/moby/security/advisories/GHSA-xw73-rw38-6vjc - fix: https://github.com/moby/moby/commit/3e230cfdcc989dc524882f6579f9e0dac77400ae - fix: https://github.com/moby/moby/commit/fca702de7f71362c8d103073c7e4a1d0a467fadd - fix: https://github.com/moby/moby/commit/fce6e0ca9bc000888de3daa157af14fa41fcd0ff source: id: GHSA-xw73-rw38-6vjc created: 2024-07-01T15:02:00.395966-04:00 review_status: REVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2706.yaml
id: GO-2024-2706 modules: - module: github.com/mattermost/mattermost-server versions: - introduced: 9.3.0+incompatible - fixed: 9.3.3+incompatible - introduced: 9.4.0+incompatible - fixed: 9.4.4+incompatible - introduced: 9.5.0+incompatible - fixed: 9.5.2+incompatible vulnerable_at: 9.5.1+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - introduced: 8.1.0 - fixed: 8.1.11 vulnerable_at: 8.0.0-20240626145722-59998b0b8473 summary: Mattermost Server Improper Access Control in github.com/mattermost/mattermost-server cves: - CVE-2024-29221 ghsas: - GHSA-w67v-ph4x-f48q references: - advisory: https://github.com/advisories/GHSA-w67v-ph4x-f48q - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-29221 - web: https://github.com/mattermost/mattermost/commit/0dc03fbc6e3c9afb14137e72ab3fa6f5a0125b9c - web: https://github.com/mattermost/mattermost/commit/5cce9fed7363386afebd81a58fb5fab7d2729c8f - web: https://github.com/mattermost/mattermost/commit/a5784f34ba6592c6454b8742f24af9d06279e347 - web: https://github.com/mattermost/mattermost/commit/dd3fe2991a70a41790d6bef5d31afc5957525f3c - web: https://mattermost.com/security-updates source: id: GHSA-w67v-ph4x-f48q created: 2024-06-26T14:00:22.694802-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0163.yaml
id: GO-2021-0163 modules: - module: std versions: - fixed: 1.5.4 - introduced: 1.6.0-0 - fixed: 1.6.1 vulnerable_at: 1.6.0 packages: - package: syscall symbols: - LoadLibrary skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)' summary: Privilege escalation on Windows via malicious DLL in syscall description: |- Untrusted search path vulnerability on Windows related to LoadLibrary allows local users to gain privileges via a malicious DLL in the current working directory. published: 2022-01-05T22:41:50Z cves: - CVE-2016-3958 references: - fix: https://go.dev/cl/21428 - fix: https://go.googlesource.com/go/+/6a0bb87bd0bf0fdf8ddbd35f77a75ebd412f61b0 - report: https://go.dev/issue/14959 - web: https://groups.google.com/g/golang-announce/c/9eqIHqaWvck review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1053.yaml
id: GO-2022-1053 modules: - module: github.com/supranational/blst versions: - introduced: 0.3.0 - fixed: 0.3.3 vulnerable_at: 0.3.2 packages: - package: github.com/supranational/blst/bindings/go summary: Incorrect signatures in github.com/supranational/blst description: |- Potential creation of an invalid signature from correct inputs. Some inputs to the blst_fp_eucl_inverse function can produce incorrect outputs. This could theoretically permit the creation of an invalid signature from correct inputs. ghsas: - GHSA-x279-68rr-jp4p references: - advisory: https://github.com/advisories/GHSA-x279-68rr-jp4p - fix: https://github.com/supranational/blst/commit/dd980e7f81397895705c49fcb4f52e485bb45e21 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0053.yaml
id: GO-2021-0053 modules: - module: github.com/gogo/protobuf versions: - fixed: 1.3.2 vulnerable_at: 1.3.1 packages: - package: github.com/gogo/protobuf/plugin/unmarshal symbols: - unmarshal.field - unmarshal.Generate summary: Panic due to improper input validation in github.com/gogo/protobuf description: |- Due to improper bounds checking, maliciously crafted input to generated Unmarshal methods can cause an out-of-bounds panic. If parsing messages from untrusted parties, this may be used as a denial of service vector. published: 2021-04-14T20:04:52Z cves: - CVE-2021-3121 ghsas: - GHSA-c3h9-896r-86jm references: - fix: https://github.com/gogo/protobuf/commit/b03c65ea87cdc3521ede29f62fe3ce239267c1bc review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1826.yaml
id: GO-2023-1826 modules: - module: github.com/moov-io/signedxml versions: - fixed: 1.1.0 vulnerable_at: 1.0.0 packages: - package: github.com/moov-io/signedxml symbols: - Validator.Validate summary: Signature validation bypass in github.com/moov-io/signedxml description: |- Signature validation canonicalizes the input XML document before validating the signature. Parsing the uncanonicalized and canonicalized forms can produce different results. An attacker can exploit this variation to bypass signature validation. Users of signature validation must only parse the canonicalized form of the validated document. The Validator.Validate function does not return the canonical form, and cannot be used safely. Users should only use the Validator.ValidateReferences function and only parse the canonical form which it returns. The Validator.Validate function was removed in github.com/moov-io/signedxml v1.1.0. cves: - CVE-2023-34205 ghsas: - GHSA-jqvr-j2vg-gjrv references: - report: https://github.com/moov-io/signedxml/issues/23 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2667.yaml
id: GO-2024-2667 modules: - module: github.com/argoproj/argo-cd/v2 versions: - introduced: 2.4.0 - fixed: 2.8.14 - introduced: 2.9.0 - fixed: 2.9.10 - introduced: 2.10.0 - fixed: 2.10.5 vulnerable_at: 2.10.4 summary: Out of memory crash from malicious Helm registry in github.com/argoproj/argo-cd/v2 cves: - CVE-2024-29893 ghsas: - GHSA-jhwx-mhww-rgc3 references: - advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-jhwx-mhww-rgc3 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0005.yaml
id: GO-2020-0005 modules: - module: go.etcd.io/etcd versions: - fixed: 0.5.0-alpha.5.0.20200423152442-f4b650b51dc4 vulnerable_at: 0.5.0-alpha.5.0.20200422225029-2369cb367873 packages: - package: go.etcd.io/etcd/wal symbols: - WAL.ReadAll - decoder.decodeRecord derived_symbols: - Create - Repair - Verify summary: Panic due to malformed WALs in go.etcd.io/etcd description: |- Malformed WALs can be constructed such that WAL.ReadAll can cause attempted out of bounds reads, or creation of arbitrarily sized slices, which may be used as a DoS vector. published: 2021-04-14T20:04:52Z cves: - CVE-2020-15106 - CVE-2020-15112 ghsas: - GHSA-m332-53r6-2w93 - GHSA-p4g4-wgrh-qrg2 credits: - Trail of Bits references: - fix: https://github.com/etcd-io/etcd/pull/11793 - fix: https://github.com/etcd-io/etcd/commit/f4b650b51dc4a53a8700700dc12e1242ac56ba07 - web: https://github.com/etcd-io/etcd/blob/master/security/SECURITY_AUDIT.pdf review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0534.yaml
id: GO-2022-0534 modules: - module: github.com/runatlantis/atlantis versions: - fixed: 0.19.7 vulnerable_at: 0.19.6 packages: - package: github.com/runatlantis/atlantis/server/controllers/events symbols: - DefaultGitlabRequestParserValidator.ParseAndValidate summary: Timing attack in github.com/runatlantis/atlantis description: |- Validation of Gitlab requests can leak secrets. The package github.com/runatlantis/atlantis/server/controllers/events uses a non-constant time comparison for secrets while validating a Gitlab request. This allows for a timing attack where an attacker can recover a secret and then forge the request. published: 2022-08-11T20:54:51Z cves: - CVE-2022-24912 ghsas: - GHSA-jxqv-jcvh-7gr4 credits: - cedws references: - fix: https://github.com/runatlantis/atlantis/pull/2392 - fix: https://github.com/runatlantis/atlantis/commit/48870911974adddaa4c99c8089e79b7d787fa820 - web: https://github.com/runatlantis/atlantis/issues/2391 - web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUNATLANTISATLANTISSERVERCONTROLLERSEVENTS-2950851 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2968.yaml
id: GO-2024-2968 modules: - module: github.com/zitadel/zitadel non_go_versions: - introduced: 2.0.0 - fixed: 2.53.8 - introduced: 2.54.0 - fixed: 2.54.5 - introduced: 2.55.0 - fixed: 2.55.1 vulnerable_at: 1.87.5 summary: ZITADEL Vulnerable to Session Information Leakage in github.com/zitadel/zitadel cves: - CVE-2024-39683 ghsas: - GHSA-cvw9-c57h-3397 references: - advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-cvw9-c57h-3397 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39683 - fix: https://github.com/zitadel/zitadel/commit/4a262e42abac2208b02fefaf68ba1a5121649f04 - fix: https://github.com/zitadel/zitadel/commit/c2093ce01507ca8fc811609ff5d391693360c3da - fix: https://github.com/zitadel/zitadel/commit/d04f208486a418a45b884b9ca8433e5ad9790d73 - fix: https://github.com/zitadel/zitadel/pull/8231 - report: https://github.com/zitadel/zitadel/issues/8213 - web: https://discord.com/channels/927474939156643850/1254096852937347153 - web: https://github.com/zitadel/zitadel/releases/tag/v2.53.8 - web: https://github.com/zitadel/zitadel/releases/tag/v2.54.5 - web: https://github.com/zitadel/zitadel/releases/tag/v2.55.1 source: id: GHSA-cvw9-c57h-3397 created: 2024-07-08T13:24:14.455414-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1753.yaml
id: GO-2023-1753 modules: - module: std versions: - fixed: 1.19.9 - introduced: 1.20.0-0 - fixed: 1.20.4 vulnerable_at: 1.20.3 packages: - package: html/template symbols: - appendCmd - htmlNospaceEscaper derived_symbols: - Template.Execute - Template.ExecuteTemplate summary: Improper handling of empty HTML attributes in html/template description: |- Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags. credits: - Juho Nurminen of Mattermost references: - report: https://go.dev/issue/59722 - fix: https://go.dev/cl/491617 - web: https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU cve_metadata: id: CVE-2023-29400 cwe: 'CWE-74: Improper input validation' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0957.yaml
id: GO-2022-0957 modules: - module: github.com/tidwall/gjson versions: - fixed: 1.6.5 vulnerable_at: 1.6.4 packages: - package: github.com/tidwall/gjson symbols: - parseObject - queryMatches derived_symbols: - Get - GetBytes - GetMany - GetManyBytes - Result.Get summary: Denial of service via maliciously crafted JSON in github.com/tidwall/gjson description: A maliciously crafted JSON input can cause a denial of service attack. published: 2022-08-25T06:28:20Z cves: - CVE-2020-36066 ghsas: - GHSA-wjm3-fq3r-5x46 references: - fix: https://github.com/tidwall/match/commit/c2f534168b739a7ec1821a33839fb2f029f26bbc - web: https://github.com/tidwall/gjson/commit/9f58baa7a613f89dfdc764c39e47fd3a15606153 - web: https://github.com/tidwall/gjson/issues/195 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1681.yaml
id: GO-2023-1681 modules: - module: github.com/containers/podman/v4 versions: - fixed: 4.4.2 vulnerable_at: 4.4.1 packages: - package: github.com/containers/podman/v4/utils symbols: - CreateTarFromSrc summary: Time-of-check time-of-use race condition in github.com/containers/podman/v4 description: |- A Time-of-check Time-of-use (TOCTOU) flaw appears in this version of podman. This issue may allow a malicious user to replace a normal file in a volume with a symlink while exporting the volume, allowing for access to arbitrary files on the host file system. cves: - CVE-2023-0778 ghsas: - GHSA-qwqv-rqgf-8qh8 references: - web: https://bugzilla.redhat.com/show_bug.cgi?id=2168256 - fix: https://github.com/containers/podman/pull/17528 - fix: https://github.com/containers/podman/pull/17532 - fix: https://github.com/containers/podman/commit/6ca857feb07a5fdc96fd947afef03916291673d8 - advisory: https://github.com/advisories/GHSA-qwqv-rqgf-8qh8 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2613.yaml
id: GO-2024-2613 modules: - module: github.com/1Panel-dev/1Panel versions: - fixed: 1.10.1-lts vulnerable_at: 1.9.6 summary: Unauthorized Console access in github.com/1Panel-dev/1Panel description: |- If the user attempts to access a secure entry point and intercepts with Burp, they can get access to the console page. This access does not return data nor allow modification operations. cves: - CVE-2024-27288 ghsas: - GHSA-26w3-q4j8-4xjp references: - advisory: https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-26w3-q4j8-4xjp - web: https://github.com/1Panel-dev/1Panel/releases/tag/v1.10.1-lts - fix: https://github.com/1Panel-dev/1Panel/pull/4014 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2186.yaml
id: GO-2023-2186 modules: - module: std versions: - fixed: 1.20.11 - introduced: 1.21.0-0 - fixed: 1.21.4 vulnerable_at: 1.21.3 packages: - package: path/filepath symbols: - IsLocal summary: Incorrect detection of reserved device names on Windows in path/filepath description: |- On Windows, The IsLocal function does not correctly detect reserved device names in some cases. Reserved names followed by spaces, such as "COM1 ", and reserved names "COM" and "LPT" followed by superscript 1, 2, or 3, are incorrectly reported as local. With fix, IsLocal now correctly reports these names as non-local. references: - report: https://go.dev/issue/63713 - fix: https://go.dev/cl/540277 - web: https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY cve_metadata: id: CVE-2023-45284 cwe: 'CWE-41: Improper Resolution of Path Equivalence' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2494.yaml
id: GO-2024-2494 modules: - module: github.com/moby/buildkit versions: - fixed: 0.12.5 vulnerable_at: 0.12.4 packages: - package: github.com/moby/buildkit/executor symbols: - MountStubsCleaner fix_links: - https://github.com/moby/buildkit/commit/00fe637d43aba66f0937f5bdf4b9fc96991794fd summary: Host system modification in github.com/moby/buildkit description: |- A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. cves: - CVE-2024-23652 ghsas: - GHSA-4v98-7qmw-rqr8 credits: - '@rmcnamara-snyk' references: - advisory: https://github.com/moby/buildkit/security/advisories/GHSA-4v98-7qmw-rqr8 - fix: https://github.com/moby/buildkit/pull/4603 - web: https://github.com/moby/buildkit/releases/tag/v0.12.5 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2444.yaml
id: GO-2024-2444 modules: - module: github.com/mattermost/mattermost-server vulnerable_at: 9.9.0+incompatible - module: github.com/mattermost/mattermost-server/v5 vulnerable_at: 5.39.3 - module: github.com/mattermost/mattermost-server/v6 vulnerable_at: 6.7.2 - module: github.com/mattermost/mattermost/server/v8 non_go_versions: - fixed: 8.1.7 vulnerable_at: 8.0.0-20240626184126-817e18414e41 summary: Mattermost allows demoted guests to change group names in github.com/mattermost/mattermost-server cves: - CVE-2023-50333 ghsas: - GHSA-9w97-9rqx-8v4j unknown_aliases: - BIT-mattermost-2023-50333 - CGA-28fj-7rmv-xw55 references: - advisory: https://github.com/advisories/GHSA-9w97-9rqx-8v4j - advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-50333 - web: https://github.com/mattermost/mattermost/commit/61dd452fb2fcd3ac6f7b2e050f7f0a93a92d95fc - web: https://mattermost.com/security-updates source: id: GHSA-9w97-9rqx-8v4j created: 2024-06-26T16:12:41.49358-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0252.yaml
id: GO-2022-0252 modules: - module: github.com/cloudflare/cfrpki versions: - fixed: 1.4.0 vulnerable_at: 1.3.0 packages: - package: github.com/cloudflare/cfrpki/validator/lib symbols: - IPNet.GetRange - ValidateIPCertificateList - GetRangeIP - ValidateIPRoaCertificateList derived_symbols: - DecodeROA - DecoderConfig.DecodeROA - RPKICertificate.ValidateIPCertificate - RPKIROA.ValidateIPRoaCertificate summary: Panic on misconfigured IP address in github.com/cloudflare/cfrpki description: |- OctoRPKI crashes when a repository returns an ROA with a IP address that contains too many bits. published: 2022-07-15T23:07:41Z cves: - CVE-2021-3911 ghsas: - GHSA-w6ww-fmfx-2x22 credits: - Koen van Hove references: - fix: https://github.com/cloudflare/cfrpki/commit/2882307febd66801de97b2a2ce4d93fe58132005 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1178.yaml
id: GO-2022-1178 modules: - module: github.com/bradleyfalzon/ghinstallation versions: - fixed: 1.1.2-0.20210308182858-d24f14f8be70 vulnerable_at: 1.1.1 packages: - package: github.com/bradleyfalzon/ghinstallation symbols: - Transport.refreshToken - Transport.Token derived_symbols: - Transport.RoundTrip summary: JWT leak in github.com/bradleyfalzon/ghinstallation description: |- Errors returned by ghinstallation.Transport can include the JWT used for the failed operation. If the error is exposed to an untrusted party, this JWT could be extracted and used to authenticate further requests. cves: - CVE-2022-39304 ghsas: - GHSA-h4q8-96p6-jcgr credits: - '@Miskerest' references: - advisory: https://github.com/bradleyfalzon/ghinstallation/security/advisories/GHSA-h4q8-96p6-jcgr - fix: https://github.com/bradleyfalzon/ghinstallation/commit/d24f14f8be70d94129d76026e8b0f4f9170c8c3e - web: https://docs.github.com/en/developers/apps/building-github-apps/authenticating-with-github-apps#authenticating-as-an-installation review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0026.yaml
id: GO-2020-0026 modules: - module: github.com/openshift/source-to-image versions: - fixed: 1.1.10-0.20180427153919-f5cbcbc5cc6f vulnerable_at: 1.1.9 packages: - package: github.com/openshift/source-to-image/pkg/tar symbols: - stiTar.ExtractTarStreamFromTarReader - stiTar.extractLink - New derived_symbols: - stiTar.ExtractTarStream - stiTar.ExtractTarStreamWithLogging summary: |- Arbitrary file write via archive extraction in github.com/openshift/source-to-image description: |- Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. published: 2021-04-14T20:04:52Z cves: - CVE-2018-1103 ghsas: - GHSA-w55j-f7vx-6q37 references: - fix: https://github.com/openshift/source-to-image/commit/f5cbcbc5cc6f8cc2f479a7302443bea407a700cb - web: https://snyk.io/research/zip-slip-vulnerability review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0525.yaml
id: GO-2022-0525 modules: - module: std versions: - fixed: 1.17.12 - introduced: 1.18.0-0 - fixed: 1.18.4 vulnerable_at: 1.18.3 packages: - package: net/http symbols: - transferReader.parseTransferEncoding summary: Improper sanitization of Transfer-Encoding headers in net/http description: |- The HTTP/1 client accepted some invalid Transfer-Encoding headers as indicating a "chunked" encoding. This could potentially allow for request smuggling, but only if combined with an intermediate server that also improperly failed to reject the header as invalid. published: 2022-07-25T17:34:18Z credits: - Zeyu Zhang (https://www.zeyu2001.com/) references: - fix: https://go.dev/cl/409874 - fix: https://go.googlesource.com/go/+/e5017a93fcde94f09836200bca55324af037ee5f - report: https://go.dev/issue/53188 - fix: https://go.dev/cl/410714 - web: https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE cve_metadata: id: CVE-2022-1705 cwe: 'CWE-444: Inconsistent Interpretation of HTTP Requests (''HTTP Request Smuggling'')' description: |- Acceptance of some invalid Transfer-Encoding headers in the HTTP/1 client in net/http before Go 1.17.12 and Go 1.18.4 allows HTTP request smuggling if combined with an intermediate server that also improperly fails to reject the header as invalid. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2855.yaml
id: GO-2024-2855 modules: - module: github.com/grafana/grafana non_go_versions: - introduced: 7.0.0 - fixed: 8.5.14 - introduced: 9.0.0 - fixed: 9.1.8 vulnerable_at: 5.4.5+incompatible summary: Grafana Plugin signature bypass in github.com/grafana/grafana cves: - CVE-2022-31123 ghsas: - GHSA-rhxj-gh46-jvw8 unknown_aliases: - BIT-grafana-2022-31123 references: - advisory: https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-31123 - web: https://github.com/grafana/grafana/releases/tag/v9.1.8 - web: https://security.netapp.com/advisory/ntap-20221124-0002 source: id: GHSA-rhxj-gh46-jvw8 created: 2024-06-04T14:27:06.393242-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1992.yaml
id: GO-2023-1992 modules: - module: golang.org/x/crypto versions: - fixed: 0.0.0-20190424203555-c05e17bb3b2d vulnerable_at: 0.0.0-20190422183909-d864b10871cd packages: - package: golang.org/x/crypto/openpgp/clearsign symbols: - Decode summary: Misleading message verification in golang.org/x/crypto/openpgp/clearsign description: |- The clearsign package accepts some malformed messages, making it possible for an attacker to trick a human user (but not a Go program) into thinking unverified text is part of the message. With fix, messages with malformed headers in the SIGNED MESSAGE section are rejected. cves: - CVE-2019-11841 ghsas: - GHSA-x3jr-pf6g-c48f credits: - Aida Mynzhasova (SEC Consult Vulnerability Lab) references: - fix: https://go-review.git.corp.google.com/c/crypto/+/173778 - fix: https://go.googlesource.com/crypto/+/c05e17bb3b2dca130fc919668a96b4bec9eb9442 - web: https://groups.google.com/d/msg/golang-openpgp/6vdgZoTgbIY/K6bBY9z3DAAJ review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0563.yaml
id: GO-2022-0563 modules: - module: github.com/filebrowser/filebrowser/v2 versions: - fixed: 2.18.0 vulnerable_at: 2.17.2 packages: - package: github.com/filebrowser/filebrowser/v2/http symbols: - NewHandler summary: Cross-site request forgery in github.com/filebrowser/filebrowser/v2 description: |- A Cross-Site Request Forgery vulnerability exists in Filebrowser that allows attackers to create a backdoor user with admin privilege and get access to the filesystem via a malicious HTML webpage that is sent to the victim. published: 2022-02-05T00:00:31Z cves: - CVE-2021-46398 ghsas: - GHSA-72wf-hwcq-65h9 credits: - Febin references: - fix: https://github.com/filebrowser/filebrowser/commit/74b7cd8e81840537a8206317344f118093153e8d - web: https://github.com/filebrowser/filebrowser/issues/1621 - web: https://systemweakness.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2454.yaml
id: GO-2024-2454 modules: - module: github.com/lestrrat-go/jwx versions: - introduced: 1.0.8 - fixed: 1.2.28 vulnerable_at: 1.2.27 packages: - package: github.com/lestrrat-go/jwx/jws symbols: - Message.UnmarshalJSON - module: github.com/lestrrat-go/jwx/v2 versions: - fixed: 2.0.19 vulnerable_at: 2.0.18 packages: - package: github.com/lestrrat-go/jwx/v2/jws symbols: - Message.UnmarshalJSON summary: Panic due to nil pointer dereference in github.com/lestrrat-go/jwx/v2 cves: - CVE-2024-21664 ghsas: - GHSA-pvcr-v8j8-j5q3 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21664 - fix: https://github.com/lestrrat-go/jwx/commit/0e8802ce6842625845d651456493e7c87625601f - fix: https://github.com/lestrrat-go/jwx/commit/d69a721931a5c48b9850a42404f18e143704adcd notes: - This report covers issues 2454, for v2, and 2455, for v1. - The earliest v1 version with the vulnerable symbol is v1.0.8. - The fix for v1 was not known initially, the GHSA got updated later. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0189.yaml
id: GO-2022-0189 modules: - module: cmd versions: - fixed: 1.10.6 - introduced: 1.11.0-0 - fixed: 1.11.3 vulnerable_at: 1.11.2 packages: - package: cmd/go/internal/get symbols: - downloadPackage skip_fix: 'TODO: revisit this reason (cant request explicit version v1.11.2 of standard library package cmd/go/internal/get' summary: Remote command execution via "go get" with "-u" flag in cmd/go description: |- The "go get" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains, it's possible to arrange things so that a Git repository is cloned to a folder named ".git" by using a vanity import path that ends with "/.git". If the Git repository root contains a "HEAD" file, a "config" file, an "objects" directory, a "refs" directory, with some work to ensure the proper ordering of operations, "go get -u" can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the "config" file in the original Git repository root for its configuration, and if that config file contains malicious commands, they will execute on the system running "go get -u". Note that forbidding import paths with a .git element might not be sufficient to mitigate this issue, as on certain systems there can be other aliases for VCS state folders. published: 2022-08-04T21:30:35Z cves: - CVE-2018-16873 credits: - Etienne Stalmans of Heroku references: - fix: https://go.dev/cl/154101 - fix: https://go.googlesource.com/go/+/bc82d7c7db83487e05d7a88e06549d4ae2a688c3 - report: https://go.dev/issue/29230 - web: https://groups.google.com/g/golang-announce/c/Kw31K8G7Fi0 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2115.yaml
id: GO-2023-2115 modules: - module: github.com/gofiber/fiber/v2 versions: - fixed: 2.50.0 vulnerable_at: 2.49.2 packages: - package: github.com/gofiber/fiber/v2/middleware/csrf symbols: - configDefault - New - CsrfFromParam - CsrfFromForm - CsrfFromCookie - CsrfFromHeader - CsrfFromQuery - newManager - manager.getRaw - manager.setRaw summary: CSRF token reuse vulnerability in github.com/gofiber/fiber/v2 description: |- A cross-site request forgery vulnerability in this package can allow an attacker to inject arbitrary values and forge malicious requests on behalf of a user. The attacker may inject arbitrary values without any authentication, or perform various malicious actions on behalf of an authenticated user, potentially compromising the security and integrity of the application. The vulnerability is caused by improper validation and enforcement of CSRF tokens within the application. For 'safe' methods, the token is extracted from the cookie and saved to storage without further validation or sanitization. In addition, the CSRF token is validated against tokens in storage but not associated with a session, nor by using a Double Submit Cookie Method, allowing for token reuse. cves: - CVE-2023-45128 ghsas: - GHSA-94w9-97p3-p368 references: - advisory: https://github.com/gofiber/fiber/security/advisories/GHSA-94w9-97p3-p368 - fix: https://github.com/gofiber/fiber/commit/8c3916dbf4ad2ed427d02c6eb63ae8b2fa8f019a - fix: https://github.com/gofiber/fiber/commit/b50d91d58ecdff2a330bf07950244b6c4caf65b1 notes: - There is a closely related vulnerability (GO-2023-2116), and it is not clear which fix applies to which vulnerability, so I have marked both fixes as applying to both vulnerabilities. review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2928.yaml
id: GO-2024-2928 modules: - module: github.com/flipped-aurora/gin-vue-admin versions: - fixed: 2.6.6+incompatible vulnerable_at: 2.6.5+incompatible summary: SQL injection vulnerability in Gin-vue-admin in github.com/flipped-aurora/gin-vue-admin cves: - CVE-2024-37896 references: - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37896 - fix: https://github.com/flipped-aurora/gin-vue-admin/commit/53d03382188868464ade489ab0713b54392d227f - web: https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gf3r-h744-mqgp source: id: CVE-2024-37896 created: 2024-06-27T15:54:20.259992-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1526.yaml
id: GO-2023-1526 modules: - module: github.com/hakobe/paranoidhttp versions: - fixed: 0.3.0 vulnerable_at: 0.2.0 packages: - package: github.com/hakobe/paranoidhttp symbols: - safeAddr summary: Server-side request forgery in github.com/hakobe/paranoidhttp description: |- Paranoidhttp before is vulnerable to SSRF because [::] is equivalent to the 127.0.0.1 address, but does not match the filter for private addresses. cves: - CVE-2023-24623 ghsas: - GHSA-v9mp-j8g7-2q6m references: - web: https://github.com/hakobe/paranoidhttp/blob/master/CHANGELOG.md#v030-2023-01-19 - fix: https://github.com/hakobe/paranoidhttp/commit/07f671da14ce63a80f4e52432b32e8d178d75fd3 - web: https://github.com/hakobe/paranoidhttp/compare/v0.2.0...v0.3.0 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0254.yaml
id: GO-2022-0254 modules: - module: github.com/ethereum/go-ethereum versions: - fixed: 1.10.8 vulnerable_at: 1.10.7 packages: - package: github.com/ethereum/go-ethereum/core/vm symbols: - opCall - opCallCode - opDelegateCall - opStaticCall - EVMInterpreter.Run derived_symbols: - EVM.Call - EVM.CallCode - EVM.Create - EVM.Create2 - EVM.DelegateCall - EVM.StaticCall summary: Consensus flaw during block processing in github.com/ethereum/go-ethereum description: |- A vulnerability in the Geth EVM can cause a node to reject the canonical chain. A memory-corruption bug within the EVM can cause a consensus error, where vulnerable nodes obtain a different stateRoot when processing a maliciously crafted transaction. This, in turn, would lead to the chain being split in two forks. published: 2022-07-15T23:07:56Z cves: - CVE-2021-39137 ghsas: - GHSA-9856-9gg9-qcmq references: - fix: https://github.com/ethereum/go-ethereum/pull/23381/commits/4d4879cafd1b3c906fc184a8c4a357137465128f review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1184.yaml
id: GO-2022-1184 modules: - module: code.sajari.com/docconv versions: - introduced: 1.1.0 - fixed: 1.3.5 vulnerable_at: 1.3.4 packages: - package: code.sajari.com/docconv symbols: - PDFHasImage - ConvertPDF derived_symbols: - Convert - ConvertPages - ConvertPath - ConvertPathReadability summary: OS command injection vulnerability in code.sajari.com/docconv description: |- The manipulation of the argument path to docconv.{ConvertPDF,PDFHasImage} leads to os command injection. cves: - CVE-2022-4643 ghsas: - GHSA-6m4h-hfpp-x8cx references: - fix: https://github.com/sajari/docconv/pull/110 - web: https://github.com/sajari/docconv/releases/tag/v1.3.5 - fix: https://github.com/sajari/docconv/commit/b19021ade3d0b71c89d35cb00eb9e589a121faa5 - web: https://vuldb.com/?id.216502 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2903.yaml
id: GO-2024-2903 modules: - module: github.com/evmos/evmos vulnerable_at: 1.1.3 - module: github.com/evmos/evmos/v2 vulnerable_at: 2.0.2 - module: github.com/evmos/evmos/v3 vulnerable_at: 3.0.3 - module: github.com/evmos/evmos/v4 vulnerable_at: 4.0.2 - module: github.com/evmos/evmos/v5 vulnerable_at: 5.0.1 - module: github.com/evmos/evmos/v6 vulnerable_at: 6.0.4 - module: github.com/evmos/evmos/v7 vulnerable_at: 7.0.0 - module: github.com/evmos/evmos/v8 vulnerable_at: 8.2.3 - module: github.com/evmos/evmos/v9 vulnerable_at: 9.1.0 - module: github.com/evmos/evmos/v10 vulnerable_at: 10.0.1 - module: github.com/evmos/evmos/v11 vulnerable_at: 11.0.2 - module: github.com/evmos/evmos/v12 vulnerable_at: 12.1.6 - module: github.com/evmos/evmos/v13 vulnerable_at: 13.0.2 - module: github.com/evmos/evmos/v14 vulnerable_at: 14.1.0 - module: github.com/evmos/evmos/v15 vulnerable_at: 15.0.0 - module: github.com/evmos/evmos/v16 vulnerable_at: 16.0.4 - module: github.com/evmos/evmos/v17 vulnerable_at: 17.0.1 - module: github.com/evmos/evmos/v18 versions: - fixed: 18.1.0 vulnerable_at: 18.0.1 summary: Contract balance not updating correctly after interchain transaction in github.com/evmos/evmos cves: - CVE-2024-37153 ghsas: - GHSA-xgr7-jgq3-mhmc references: - advisory: https://github.com/evmos/evmos/security/advisories/GHSA-xgr7-jgq3-mhmc - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37153 - fix: https://github.com/evmos/evmos/commit/478b7a62e7af57a70cf3a01126c7f5a89bee69d7 source: id: GHSA-xgr7-jgq3-mhmc created: 2024-06-26T14:08:58.142641-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1732.yaml
id: GO-2023-1732 modules: - module: github.com/bnb-chain/tss-lib versions: - fixed: 1.3.6-0.20230324145555-bb6fb30bd3eb vulnerable_at: 1.3.5 packages: - package: github.com/bnb-chain/tss-lib/common - module: github.com/binance-chain/tss-lib vulnerable_at: 1.3.0 packages: - package: github.com/binance-chain/tss-lib/common summary: |- Timing attack from non-constant time scalar multiplication in github.com/bnb-chain/tss-lib description: |- Timing attack from non-constant time scalar multiplication in github.com/bnb-chain/tss-lib. cves: - CVE-2023-26556 references: - advisory: https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1549.yaml
id: GO-2023-1549 modules: - module: github.com/openshift/apiserver-library-go versions: - fixed: 0.0.0-20230119093715-30f75d79e424 vulnerable_at: 0.0.0-20221118165437-6006085c7412 packages: - package: github.com/openshift/apiserver-library-go/pkg/securitycontextconstraints/seccomp symbols: - strategy.validateProfile derived_symbols: - strategy.ValidateContainer - strategy.ValidatePod summary: Improper input validation in github.com/openshift/apiserver-library-go description: |- Low-privileged users can set the seccomp profile for pods they control to "unconfined." By default, the seccomp profile used in the restricted-v2 Security Context Constraint (SCC) is "runtime/default," allowing users to disable seccomp for pods they can create and modify. cves: - CVE-2023-0229 ghsas: - GHSA-5465-xc2j-6p84 references: - advisory: https://github.com/advisories/GHSA-5465-xc2j-6p84 - fix: https://github.com/openshift/apiserver-library-go/pull/97 - fix: https://github.com/openshift/apiserver-library-go/commit/30f75d79e424ca462c6de53ee8b93f91183763e6 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2493.yaml
id: GO-2024-2493 modules: - module: github.com/moby/buildkit versions: - fixed: 0.12.5 vulnerable_at: 0.12.4 packages: - package: github.com/moby/buildkit/executor/oci symbols: - submounts.cleanup - submounts.subMount - sub - package: github.com/moby/buildkit/snapshot symbols: - LocalMounterWithMounts - localMounter.Mount - LocalMounter fix_links: - https://github.com/moby/buildkit/commit/f781267af1acb688e94740e1fdc22c1bf587d7fd summary: Host system file access in github.com/moby/buildkit description: |- Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. cves: - CVE-2024-23651 ghsas: - GHSA-m3r6-h7wv-7xxv credits: - '@rmcnamara-snyk' references: - fix: https://github.com/moby/buildkit/pull/4604 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2402.yaml
id: GO-2023-2402 modules: - module: golang.org/x/crypto versions: - fixed: 0.17.0 vulnerable_at: 0.16.0 packages: - package: golang.org/x/crypto/ssh symbols: - handshakeTransport.readLoop - handshakeTransport.sendKexInit - handshakeTransport.enterKeyExchange - transport.readPacket - connectionState.readPacket - transport.writePacket - connectionState.writePacket derived_symbols: - Client.Dial - Client.DialContext - Client.DialTCP - Client.Listen - Client.ListenTCP - Client.ListenUnix - Client.NewSession - Dial - DiscardRequests - NewClient - NewClientConn - NewServerConn - Request.Reply - Session.Close - Session.CombinedOutput - Session.Output - Session.RequestPty - Session.RequestSubsystem - Session.Run - Session.SendRequest - Session.Setenv - Session.Shell - Session.Signal - Session.Start - Session.WindowChange - channel.Accept - channel.Close - channel.CloseWrite - channel.Read - channel.ReadExtended - channel.Reject - channel.SendRequest - channel.Write - channel.WriteExtended - curve25519sha256.Client - curve25519sha256.Server - dhGEXSHA.Client - dhGEXSHA.Server - dhGroup.Client - dhGroup.Server - ecdh.Client - ecdh.Server - extChannel.Read - extChannel.Write - mux.OpenChannel - mux.SendRequest - sessionStdin.Close - sshClientKeyboardInteractive.Challenge - tcpListener.Accept - tcpListener.Close - unixListener.Accept - unixListener.Close summary: |- Man-in-the-middle attacker can compromise integrity of secure channel in golang.org/x/crypto description: |- A protocol weakness allows a MITM attacker to compromise the integrity of the secure channel before it is established, allowing the attacker to prevent transmission of a number of messages immediately after the secure channel is established without either side being aware. The impact of this attack is relatively limited, as it does not compromise confidentiality of the channel. Notably this attack would allow an attacker to prevent the transmission of the SSH2_MSG_EXT_INFO message, disabling a handful of newer security features. This protocol weakness was also fixed in OpenSSH 9.6. cves: - CVE-2023-48795 ghsas: - GHSA-45x7-px36-x8w8 credits: - Fabian Bäumer (Ruhr University Bochum) - Marcus Brinkmann (Ruhr University Bochum) - Jörg Schwenk (Ruhr University Bochum) references: - report: https://go.dev/issue/64784 - fix: https://go.dev/cl/550715 - fix: https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d - web: https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg - web: https://www.openssh.com/txt/release-9.6 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0106.yaml
id: GO-2021-0106 modules: - module: github.com/whyrusleeping/tar-utils versions: - fixed: 0.0.0-20201201191210-20a61371de5b vulnerable_at: 0.0.0-20201201182126-c528cc7df19d packages: - package: github.com/whyrusleeping/tar-utils symbols: - Extractor.outputPath derived_symbols: - Extractor.Extract summary: Path traversal in github.com/whyrusleeping/tar-utils description: |- Due to improper path sanitization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. published: 2021-07-28T18:08:05Z ghsas: - GHSA-jpf8-h7h7-3ppm references: - fix: https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227 - web: https://snyk.io/research/zip-slip-vulnerability cve_metadata: id: CVE-2020-36566 cwe: 'CWE 22: Improper Limitation of a Pathname to a Restricted Directory (''Path Traversal'')' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2730.yaml
id: GO-2024-2730 modules: - module: github.com/gorilla/sessions vulnerable_at: 1.2.2 packages: - package: github.com/gorilla/sessions symbols: - FilesystemStore.save - FilesystemStore.load - FilesystemStore.erase derived_symbols: - CookieStore.Get - FilesystemStore.Get - FilesystemStore.New - FilesystemStore.Save - Registry.Get - Registry.Save - Save - Session.Save summary: 'WITHDRAWN: Directory traversal in FilesystemStore in github.com/gorilla/sessions' description: |- (This report has been withdrawn on the grounds that it generates too many false positives. Session IDs are documented as not being suitable to hold user-provided data.) FilesystemStore does not sanitize the Session.ID value, making it vulnerable to directory traversal attacks. If an attacker has control over the contents of the session ID, this can be exploited to write to arbitrary files in the filesystem. Programs which do not set session IDs explicitly, or which only set session IDs that will not be interpreted by the filesystem, are not vulnerable. withdrawn: "2024-04-17T18:06:23Z" related: - CVE-2024-3400 references: - fix: https://github.com/gorilla/sessions/pull/274 source: id: go-security-team created: 2024-04-17T07:45:30.470362-07:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2400.yaml
id: GO-2023-2400 modules: - module: github.com/sap/cloud-security-client-go versions: - fixed: 0.17.0 vulnerable_at: 0.16.0 packages: - package: github.com/sap/cloud-security-client-go/auth symbols: - matchesDomain derived_symbols: - Middleware.Authenticate - Middleware.AuthenticateWithProofOfPossession - package: github.com/sap/cloud-security-client-go/oidcclient symbols: - OIDCTenant.getJWKsFromServer - OIDCTenant.performDiscovery derived_symbols: - NewOIDCTenant - OIDCTenant.GetJWKs - package: github.com/sap/cloud-security-client-go/tokenclient symbols: - TokenFlows.ClientCredentials summary: Escalation of privileges in github.com/sap/cloud-security-client-go description: |- An unauthenticated attacker can obtain arbitrary permissions within the application under certain conditions. cves: - CVE-2023-50424 ghsas: - GHSA-92cg-ghq6-9587 - GHSA-m8rw-rcpq-2vp2 references: - web: https://me.sap.com/notes/3411067 - web: https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - web: https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067/ - advisory: https://github.com/SAP/cloud-security-services-integration-library/security/advisories/GHSA-59c9-pxq8-9c73 - fix: https://github.com/SAP/cloud-security-client-go/commit/2e3bd63e152e09f267316a1071034eb5d4b7f498 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2962.yaml
id: GO-2024-2962 modules: - module: cmd versions: - fixed: 1.21.0-0 vulnerable_at: 1.20.14 packages: - package: cmd/go summary: Output of "go env" does not sanitize values in cmd/go description: |- Command go env is documented as outputting a shell script containing the Go environment. However, go env doesn't sanitize values, so executing its output as a shell script can cause various bad bahaviors, including executing arbitrary commands or inserting new environment variables. This issue is relatively minor because, in general, if an attacker can set arbitrary environment variables on a system, they have better attack vectors than making "go env" print them out. credits: - Hunter Wittenborn (https://hunterwittenborn.com/) references: - fix: https://go.dev/cl/488375 - fix: https://go.dev/cl/493535 - report: https://go.dev/issue/58508 - web: https://groups.google.com/g/golang-dev/c/ixHOFpSbajE/m/8EjlbKVWAwAJ cve_metadata: id: CVE-2023-24531 cwe: 'CWE-138: Improper Neutralization of Special Elements' source: id: go-security-team created: 2024-07-02T12:32:20.378304-04:00 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2600.yaml
id: GO-2024-2600 modules: - module: std versions: - fixed: 1.21.8 - introduced: 1.22.0-0 - fixed: 1.22.1 vulnerable_at: 1.22.0 packages: - package: net/http symbols: - isDomainOrSubdomain derived_symbols: - Client.Do - Client.Get - Client.Head - Client.Post - Client.PostForm - Get - Head - Post - PostForm - package: net/http/cookiejar symbols: - isIP derived_symbols: - Jar.Cookies - Jar.SetCookies summary: |- Incorrect forwarding of sensitive headers and cookies on HTTP redirect in net/http description: |- When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded. credits: - Juho Nurminen of Mattermost references: - report: https://go.dev/issue/65065 - fix: https://go.dev/cl/569340 - web: https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg cve_metadata: id: CVE-2023-45289 cwe: 'CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer' references: - https://security.netapp.com/advisory/ntap-20240329-0006/ - http://www.openwall.com/lists/oss-security/2024/03/08/4 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2561.yaml
id: GO-2024-2561 modules: - module: github.com/greenpau/caddy-security unsupported_versions: - last_affected: 1.1.23 vulnerable_at: 1.1.29 summary: Server-Side Request Forgery in github.com/greenpau/caddy-security cves: - CVE-2024-21498 ghsas: - GHSA-93x8-66j2-wwr5 references: - advisory: https://github.com/advisories/GHSA-93x8-66j2-wwr5 - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21498 - report: https://github.com/greenpau/caddy-security/issues/269 - web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy - web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249862 source: id: GHSA-93x8-66j2-wwr5 created: 2024-06-14T11:42:01.981167-04:00 review_status: UNREVIEWED unexcluded: EFFECTIVELY_PRIVATE
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1772.yaml
id: GO-2023-1772 modules: - module: github.com/distribution/distribution versions: - fixed: 2.8.2-beta.1+incompatible vulnerable_at: 2.8.1+incompatible packages: - package: github.com/distribution/distribution/registry/handlers symbols: - catalogHandler.GetCatalog summary: Memory exhaustion in github.com/distribution/distribution description: |- Systems that run distribution built after a specific commit running on memory-restricted environments can suffer from denial of service by a crafted malicious /v2/_catalog API endpoint request. cves: - CVE-2023-2253 ghsas: - GHSA-hqxw-f8mx-cpmw references: - fix: https://github.com/distribution/distribution/commit/f55a6552b006a381d9167e328808565dd2bf77dc - advisory: https://github.com/advisories/GHSA-hqxw-f8mx-cpmw review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1095.yaml
id: GO-2022-1095 modules: - module: std versions: - fixed: 1.18.8 - introduced: 1.19.0-0 - fixed: 1.19.3 vulnerable_at: 1.19.2 packages: - package: syscall goos: - windows symbols: - StartProcess - package: os/exec goos: - windows symbols: - Cmd.environ - dedupEnv - dedupEnvCase derived_symbols: - Cmd.CombinedOutput - Cmd.Environ - Cmd.Output - Cmd.Run - Cmd.Start summary: Unsanitized NUL in environment variables on Windows in syscall and os/exec description: |- Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For example, the environment variable string "A=B\x00C=D" sets the variables "A=B" and "C=D". credits: - RyotaK (https://twitter.com/ryotkak) references: - report: https://go.dev/issue/56284 - fix: https://go.dev/cl/446916 - web: https://groups.google.com/g/golang-announce/c/mbHY1UY3BaM/m/hSpmRzk-AgAJ cve_metadata: id: CVE-2022-41716 cwe: 'CWE-158: Improper Neutralization of Null Byte or NUL Character' review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1703.yaml
id: GO-2023-1703 modules: - module: std versions: - fixed: 1.19.8 - introduced: 1.20.0-0 - fixed: 1.20.3 vulnerable_at: 1.20.2 packages: - package: html/template symbols: - tJS - tJSDelimited derived_symbols: - Template.Execute - Template.ExecuteTemplate summary: Backticks not treated as string delimiters in html/template description: |- Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g. "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template.Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution. credits: - Sohom Datta, Manipal Institute of Technology references: - report: https://go.dev/issue/59234 - fix: https://go.dev/cl/482079 - web: https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8 cve_metadata: id: CVE-2023-24538 cwe: 'CWE-94: Improper Control of Generation of Code (''Code Injection'')' references: - https://security.gentoo.org/glsa/202311-09 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2684.yaml
id: GO-2024-2684 modules: - module: github.com/ca17/teamsacs unsupported_versions: - last_affected: 1.0.2 vulnerable_at: 1.0.3 summary: CA17 TeamsACS Cross Site Scripting vulnerability in github.com/ca17/teamsacs cves: - CVE-2024-22780 ghsas: - GHSA-hwvw-gh23-qpvq references: - advisory: https://github.com/advisories/GHSA-hwvw-gh23-qpvq - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-22780 - web: https://fuo.fi/CVE-2024-22780 - web: https://github.com/CA17/TeamsACS/issues/26 source: id: GHSA-hwvw-gh23-qpvq created: 2024-06-06T16:16:42.764735-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2791.yaml
id: GO-2024-2791 modules: - module: github.com/cri-o/cri-o versions: - fixed: 1.27.6 - introduced: 1.28.0 - fixed: 1.28.6 - introduced: 1.29.0 - fixed: 1.29.4 vulnerable_at: 1.29.3 summary: CRI-O vulnerable to an arbitrary systemd property injection in github.com/cri-o/cri-o cves: - CVE-2024-3154 ghsas: - GHSA-2cgq-h8xw-2v5j references: - advisory: https://github.com/cri-o/cri-o/security/advisories/GHSA-2cgq-h8xw-2v5j - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-3154 - web: https://access.redhat.com/security/cve/CVE-2024-3154 - web: https://bugzilla.redhat.com/show_bug.cgi?id=2272532 - web: https://github.com/opencontainers/runc/pull/4217 - web: https://github.com/opencontainers/runtime-spec/blob/main/features.md#unsafe-annotations-in-configjson source: id: GHSA-2cgq-h8xw-2v5j created: 2024-05-17T16:10:42.126408-04:00 review_status: UNREVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0952.yaml
id: GO-2022-0952 modules: - module: github.com/matrix-org/gomatrixserverlib versions: - fixed: 0.0.0-20220815091947-723fd495dde8 vulnerable_at: 0.0.0-20220812132423-6a49c18a298a packages: - package: github.com/matrix-org/gomatrixserverlib symbols: - NewPowerLevelContentFromEvent derived_symbols: - Allowed - Event.PowerLevels - EventsLoader.LoadAndVerify - HeaderedReverseTopologicalOrdering - NewPowerLevelContentFromAuthEvents - RequestBackfill - ResolveConflicts - ResolveStateConflicts - ResolveStateConflictsV2 - RespSendJoin.Check - RespState.Check - RespState.Events - ReverseTopologicalOrdering - VerifyAuthRulesAtState - VerifyEventAuthChain summary: Incorrect event parsing in github.com/matrix-org/gomatrixserverlib description: |- Power level parsing does not parse the "events_default" key of the m.room.power_levels event, setting the event default power level to zero in all cases. This can cause events to be improperly accepted or rejected in rooms where the event_default power level has been changed. published: 2022-08-22T18:08:50Z cves: - CVE-2022-36009 ghsas: - GHSA-grvv-h2f9-7v9c references: - fix: https://github.com/matrix-org/gomatrixserverlib/commit/723fd495dde835d078b9f2074b6b62c06dea4575 review_status: REVIEWED
reports
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2752.yaml
id: GO-2024-2752 modules: - module: code.gitea.io/gitea versions: - fixed: 1.16.5 vulnerable_at: 1.16.4 summary: Gitea Open Redirect in code.gitea.io/gitea cves: - CVE-2022-1058 ghsas: - GHSA-4rqq-rxvc-v2rc unknown_aliases: - BIT-gitea-2022-1058 references: - advisory: https://github.com/advisories/GHSA-4rqq-rxvc-v2rc - advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-1058 - web: https://github.com/go-gitea/gitea/commit/e3d8e92bdc67562783de9a76b5b7842b68daeb48 - web: https://github.com/go-gitea/gitea/pull/19175 - web: https://github.com/go-gitea/gitea/pull/19186 - web: https://huntr.dev/bounties/4fb42144-ac70-4f76-a5e1-ef6b5e55dc0d source: id: GHSA-4rqq-rxvc-v2rc created: 2024-05-17T16:12:33.556783-04:00 review_status: UNREVIEWED