repo_id
stringclasses 927
values | file_path
stringlengths 99
214
| content
stringlengths 2
4.15M
|
|---|---|---|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2379.yaml
|
id: GO-2023-2379
modules:
- module: github.com/lestrrat-go/jwx
versions:
- fixed: 1.2.27
vulnerable_at: 1.2.26
packages:
- package: github.com/lestrrat-go/jwx/jwe
symbols:
- Decrypt
- module: github.com/lestrrat-go/jwx/v2
versions:
- fixed: 2.0.18
vulnerable_at: 2.0.17
packages:
- package: github.com/lestrrat-go/jwx/v2/jwe
symbols:
- decryptCtx.decryptContent
derived_symbols:
- Decrypt
summary: Denial of service due to malicious parameters in github.com/lestrrat-go/jwx
description: |-
The JWE key management algorithms based on PBKDF2 require a JOSE Header
Parameter called p2c (PBES2 Count). This parameter dictates the number of PBKDF2
iterations needed to derive a CEK wrapping key. Its purpose is to intentionally
slow down the key derivation function, making password brute-force and
dictionary attacks more resource-intensive. However, if an attacker sets the p2c
parameter in JWE to a very large number, it can cause excessive computational
consumption.
cves:
- CVE-2023-49290
ghsas:
- GHSA-7f9x-gw85-8grf
credits:
- '@P3ngu1nW'
references:
- advisory: https://github.com/lestrrat-go/jwx/security/advisories/GHSA-7f9x-gw85-8grf
- fix: https://github.com/lestrrat-go/jwx/commit/64f2a229b8e18605f47361d292b526bdc4aee01c
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0009.yaml
|
id: GO-2020-0009
modules:
- module: github.com/square/go-jose
versions:
- fixed: 0.0.0-20160903044734-789a4c4bd4c1
vulnerable_at: 0.0.0-20160831221313-d00415a0a4fd
packages:
- package: github.com/square/go-jose/cipher
goarch:
- "386"
- arm
- armbe
- amd64p32
- mips
- mipsle
- mips64p32
- mips64p32le
- ppc
- riscv
- s390
- sparc
symbols:
- cbcAEAD.computeAuthTag
derived_symbols:
- cbcAEAD.Open
- cbcAEAD.Seal
- package: github.com/square/go-jose
goarch:
- "386"
- arm
- armbe
- amd64p32
- mips
- mipsle
- mips64p32
- mips64p32le
- ppc
- riscv
- s390
- sparc
symbols:
- JsonWebEncryption.Decrypt
derived_symbols:
- genericEncrypter.Encrypt
- genericEncrypter.EncryptWithAuthData
summary: Integer overflow in github.com/square/go-jose
description: |-
On 32-bit platforms an attacker can manipulate a ciphertext encrypted with
AES-CBC with HMAC such that they can control how large the input buffer is when
computing the HMAC authentication tag. This can can allow a manipulated
ciphertext to be verified as authentic, opening the door for padding oracle
attacks.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2016-9123
ghsas:
- GHSA-3fx4-7f69-5mmg
credits:
- Quan Nguyen from Google's Information Security Engineering Team
references:
- fix: https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96
- web: https://www.openwall.com/lists/oss-security/2016/11/03/1
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2538.yaml
|
id: GO-2024-2538
modules:
- module: github.com/hashicorp/nomad
versions:
- introduced: 1.5.13
- fixed: 1.5.14
- introduced: 1.6.0
- fixed: 1.6.7
- introduced: 1.7.3
- fixed: 1.7.4
vulnerable_at: 1.7.3
packages:
- package: github.com/hashicorp/nomad/helper/escapingfs
symbols:
- pathEscapesBaseViaSymlink
derived_symbols:
- PathEscapesAllocDir
- package: github.com/hashicorp/nomad/client/allocwatcher
symbols:
- remotePrevAlloc.streamAllocDir
- remotePrevAlloc.migrateAllocDir
derived_symbols:
- remotePrevAlloc.Migrate
summary: Symlink attack in github.com/hashicorp/nomad
cves:
- CVE-2024-1329
ghsas:
- GHSA-c866-8gpw-p3mv
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1329
- report: https://github.com/hashicorp/nomad/issues/19888
- fix: https://github.com/hashicorp/nomad/commit/b3209cbc6921e703b0e9984ce70c10b378665834
- fix: https://github.com/hashicorp/nomad/commit/d1721c7a6fc1833778086603f818a822a34f445a
- fix: https://github.com/hashicorp/nomad/commit/de55da677a21ac7572c0f4a8cd9abd5473c47a70
- web: https://discuss.hashicorp.com/t/hcsec-2024-03-nomad-vulnerable-to-arbitrary-write-through-symlink-attack
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2593.yaml
|
id: GO-2024-2593
modules:
- module: github.com/mattermost/mattermost-server
versions:
- introduced: 9.2.0+incompatible
- fixed: 9.2.5+incompatible
- introduced: 9.3.0+incompatible
- fixed: 9.3.1+incompatible
- introduced: 9.4.0+incompatible
- fixed: 9.4.2+incompatible
vulnerable_at: 9.4.2-rc2+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- fixed: 8.1.9
vulnerable_at: 8.0.0-20240626184126-817e18414e41
summary: Mattermost fails to check the "invite_guest" permission in github.com/mattermost/mattermost-server
cves:
- CVE-2024-1888
ghsas:
- GHSA-pfw6-5rx3-xh3c
unknown_aliases:
- CGA-f9x4-gc5p-g8jr
references:
- advisory: https://github.com/advisories/GHSA-pfw6-5rx3-xh3c
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1888
- web: https://mattermost.com/security-updates
source:
id: GHSA-pfw6-5rx3-xh3c
created: 2024-06-26T16:09:33.224974-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2137.yaml
|
id: GO-2023-2137
modules:
- module: github.com/ydb-platform/ydb-go-sdk/v3
versions:
- introduced: 3.48.6
- fixed: 3.53.3
vulnerable_at: 3.53.2
packages:
- package: github.com/ydb-platform/ydb-go-sdk/v3
symbols:
- connect
derived_symbols:
- Connector
- Driver.Close
- Driver.Coordination
- Driver.Discovery
- Driver.Ratelimiter
- Driver.Scheme
- Driver.Scripting
- Driver.Table
- Driver.Topic
- Driver.With
- IsTimeoutError
- IsTransportError
- MustConnector
- MustOpen
- New
- Open
- Unwrap
- WithAccessTokenCredentials
- WithAnonymousCredentials
- WithCertificatesFromFile
- WithRequestType
- WithTraceID
- initOnce.Close
- initOnce.Init
- sqlDriver.OpenConnector
- package: github.com/ydb-platform/ydb-go-sdk/v3/credentials
symbols:
- NewAccessTokenCredentials
- NewAnonymousCredentials
- staticCredentialsConfig.Endpoint
- staticCredentialsConfig.GrpcDialOptions
- NewStaticCredentials
- WithSourceInfo
- package: github.com/ydb-platform/ydb-go-sdk/v3/internal/balancer
symbols:
- Balancer.clusterDiscovery
- Balancer.wrapCall
derived_symbols:
- Balancer.Invoke
- Balancer.NewStream
- New
- package: github.com/ydb-platform/ydb-go-sdk/v3/internal/conn
symbols:
- WithAfterFunc
- package: github.com/ydb-platform/ydb-go-sdk/v3/internal/credentials
symbols:
- NewAccessTokenCredentials
- AccessToken.String
- NewAnonymousCredentials
- Anonymous.String
- WithSourceInfo
- NewStaticCredentials
- Static.String
summary: Credentials leak in github.com/ydb-platform/ydb-go-sdk/v3
description: |-
A custom credentials object that does not implement the fmt.Stringer interface
may leak sensitive information (e.g., credentials) via logs.
cves:
- CVE-2023-45825
ghsas:
- GHSA-q24m-6h38-5xj8
references:
- advisory: https://github.com/ydb-platform/ydb-go-sdk/security/advisories/GHSA-q24m-6h38-5xj8
- fix: https://github.com/ydb-platform/ydb-go-sdk/pull/859
- fix: https://github.com/ydb-platform/ydb-go-sdk/commit/a0d92057c4e1bbdc5e85ae8d649edb0232b8fd4c
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2333.yaml
|
id: GO-2023-2333
modules:
- module: github.com/consensys/gnark
versions:
- fixed: 0.9.2-0.20231110170422-f528807119e9
vulnerable_at: 0.9.1
packages:
- package: github.com/consensys/gnark/std/rangecheck
symbols:
- commitChecker.commit
- nbR1CSConstraints
- nbPLONKConstraints
summary: |-
Range checker gadget allows wider inputs than allowed in
github.com/consensys/gnark
ghsas:
- GHSA-rjjm-x32p-m3f7
credits:
- '@ultrainstinct30'
references:
- advisory: https://github.com/Consensys/gnark/security/advisories/GHSA-rjjm-x32p-m3f7
- web: https://github.com/Consensys/gnark/issues/897
- fix: https://github.com/Consensys/gnark/commit/f528807119e9443df94b8c01fe8ee65abe3c75d8
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0045.yaml
|
id: GO-2020-0045
modules:
- module: github.com/dinever/golf
versions:
- fixed: 0.3.0
vulnerable_at: 0.2.0
packages:
- package: github.com/dinever/golf
symbols:
- randomBytes
derived_symbols:
- Context.Render
- Context.RenderFromString
summary: Cryptographically weak random number generation in github.com/dinever/golf
description: |-
CSRF tokens are generated using math/rand, which is not a cryptographically
secure random number generator, allowing an attacker to predict values and
bypass CSRF protections with relatively few requests.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-q9qr-jwpw-3qvv
credits:
- '@elithrar'
references:
- fix: https://github.com/dinever/golf/pull/24
- fix: https://github.com/dinever/golf/commit/3776f338be48b5bc5e8cf9faff7851fc52a3f1fe
- report: https://github.com/dinever/golf/issues/20
cve_metadata:
id: CVE-2016-15005
cwe: 'CWE 338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0519.yaml
|
id: GO-2022-0519
modules:
- module: github.com/flyteorg/flyteadmin
versions:
- fixed: 1.1.31
vulnerable_at: 1.1.30
packages:
- package: github.com/flyteorg/flyteadmin/auth/authzserver
symbols:
- ResourceServer.ValidateAccessToken
summary: Improper validation of access tokens in github.com/flyteorg/flyteadmin
description: Improper validation of access tokens can permit use of expired tokens.
published: 2022-07-30T03:51:07Z
cves:
- CVE-2022-31145
ghsas:
- GHSA-qwrj-9hmp-gpxh
references:
- fix: https://github.com/flyteorg/flyteadmin/commit/a1ec282d02706e074bc4986fd0412e5da3b9d00a
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1167.yaml
|
id: GO-2022-1167
modules:
- module: helm.sh/helm/v3
versions:
- fixed: 3.10.3
vulnerable_at: 3.10.2
packages:
- package: helm.sh/helm/v3/pkg/strvals
symbols:
- parser.key
derived_symbols:
- Parse
- ParseFile
- ParseInto
- ParseIntoFile
- ParseIntoString
- ParseJSON
- ParseString
- ToYAML
summary: Denial of service in string value parsing in helm.sh/helm/v3
description: |-
Applications that use the strvals package in the Helm SDK to parse user supplied
input can suffer a Denial of Service when that input causes an error that cannot
be recovered from.
The strvals package contains a parser that turns strings into Go structures. For
example, the Helm client has command line flags like --set, --set-string, and
others that enable the user to pass in strings that are merged into the values.
The strvals package converts these strings into structures Go can work with.
Some string inputs can cause can cause a stack overflow to be created causing a
stack overflow error. Stack overflow errors cannot be recovered from.
The Helm Client will panic with input to --set, --set-string, and other value
setting flags that causes a stack overflow. Helm is not a long running service
so the error will not affect future uses of the Helm client.
published: 2022-12-14T18:06:02Z
cves:
- CVE-2022-23524
ghsas:
- GHSA-6rx9-889q-vv2r
credits:
- Ada Logics in a fuzzing audit sponsored by CNCF
references:
- advisory: https://github.com/helm/helm/security/advisories/GHSA-6rx9-889q-vv2r
- fix: https://github.com/helm/helm/commit/3636f6824757ff734cb265b8770efe48c1fb3737
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2516.yaml
|
id: GO-2024-2516
modules:
- module: github.com/grafana/grafana
non_go_versions:
- fixed: 7.0.0
vulnerable_at: 5.4.5+incompatible
summary: Grafana XSS via a column style in github.com/grafana/grafana
cves:
- CVE-2018-18624
ghsas:
- GHSA-9hv8-4frf-cprf
references:
- advisory: https://github.com/advisories/GHSA-9hv8-4frf-cprf
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2018-18624
- fix: https://github.com/grafana/grafana/commit/0284747c88eb9435899006d26ffaf65f89dec88e
- fix: https://github.com/grafana/grafana/pull/11813
- fix: https://github.com/grafana/grafana/pull/23816
- web: https://security.netapp.com/advisory/ntap-20200608-0008
source:
id: GHSA-9hv8-4frf-cprf
created: 2024-06-14T11:39:35.057497-04:00
review_status: UNREVIEWED
unexcluded: NOT_IMPORTABLE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1505.yaml
|
id: GO-2023-1505
modules:
- module: github.com/uber/kraken
vulnerable_at: 0.1.4
packages:
- package: github.com/uber/kraken/lib/backend/testfs
symbols:
- Server.downloadHandler
- Server.Handler
summary: Arbitrary file read vulnerability in github.com/uber/kraken
description: kraken contains an arbitrary file read vulnerability via component testfs.
cves:
- CVE-2022-47747
ghsas:
- GHSA-hj4g-4w36-x8hp
references:
- report: https://github.com/uber/kraken/issues/333
- advisory: https://github.com/advisories/GHSA-hj4g-4w36-x8hp
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2510.yaml
|
id: GO-2024-2510
modules:
- module: github.com/grafana/grafana
versions:
- fixed: 5.2.0-beta1+incompatible
vulnerable_at: 5.1.5+incompatible
summary: Grafana Cross-site Scripting (XSS) in github.com/grafana/grafana
cves:
- CVE-2018-12099
ghsas:
- GHSA-v5gq-qvjq-8p53
references:
- advisory: https://github.com/advisories/GHSA-v5gq-qvjq-8p53
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2018-12099
- fix: https://github.com/grafana/grafana/pull/11813
- web: https://github.com/grafana/grafana/releases/tag/v5.2.0-beta1
- web: https://security.netapp.com/advisory/ntap-20190416-0004
source:
id: GHSA-v5gq-qvjq-8p53
created: 2024-06-14T11:38:50.241825-04:00
review_status: UNREVIEWED
unexcluded: NOT_IMPORTABLE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2658.yaml
|
id: GO-2024-2658
modules:
- module: github.com/containers/buildah
versions:
- fixed: 1.35.1
vulnerable_at: 1.35.0
packages:
- package: github.com/containers/buildah/internal/volumes
symbols:
- GetBindMount
derived_symbols:
- GetVolumes
summary: Container escape at build time in github.com/containers/buildah
description: |-
A crafted container file can use a dummy image with a symbolic link to the host
filesystem as a mount source and cause the mount operation to mount the host
filesystem during a build-time RUN step. The commands inside the RUN step
will then have read-write access to the host filesystem.
cves:
- CVE-2024-1753
ghsas:
- GHSA-pmf3-c36m-g5cf
related:
- GHSA-874v-pj72-92f3
credits:
- '@rmcnamara-snyk'
references:
- fix: https://github.com/containers/buildah/commit/9de9c20ff368beb84b84fe660773d352519dc1c5
- report: https://bugzilla.redhat.com/show_bug.cgi?id=2265513
notes:
- |
GHSA-874v-pj72-92f3 is a DEPENDENT_VULNERABILITY
of this report, but the GHSA database considers it an
alias of CVE-2024-1753. Adding the GHSA as "related"
prevents our tooling from adding it to the aliases field.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2450.yaml
|
id: GO-2024-2450
modules:
- module: github.com/mattermost/mattermost-server
non_go_versions:
- fixed: 7.8.10
vulnerable_at: 9.9.0+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- fixed: 8.1.1
vulnerable_at: 8.0.0-20240626184126-817e18414e41
summary: Mattermost viewing archived public channels permissions vulnerability in github.com/mattermost/mattermost-server
cves:
- CVE-2023-47858
ghsas:
- GHSA-w88v-pjr8-cmv2
unknown_aliases:
- BIT-mattermost-2023-47858
- CGA-4m9j-264v-7mr3
references:
- advisory: https://github.com/advisories/GHSA-w88v-pjr8-cmv2
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-47858
- web: https://mattermost.com/security-updates
source:
id: GHSA-w88v-pjr8-cmv2
created: 2024-06-26T16:13:37.899374-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2656.yaml
|
id: GO-2024-2656
modules:
- module: github.com/cilium/cilium
versions:
- fixed: 1.13.13
- introduced: 1.14.0
- fixed: 1.14.8
- introduced: 1.15.0
- fixed: 1.15.2
vulnerable_at: 1.15.1
summary: Unencrypted traffic between nodes with IPsec in github.com/cilium/cilium
description: |-
In Cilium clusters with IPsec enabled and traffic matching Layer 7 policies,
traffic that should be IPsec-encrypted between a node's Envoy proxy and pods on
other nodes is sent unencrypted, and traffic that should be IPsec-encrypted
between a node's DNS proxy and pods on other nodes is sent unencrypted.
cves:
- CVE-2024-28249
ghsas:
- GHSA-j89h-qrvr-xc36
credits:
- '@jschwinger233'
- '@julianwiedmann'
- '@giorio94'
- '@jrajahalme'
references:
- advisory: https://github.com/cilium/cilium/security/advisories/GHSA-j89h-qrvr-xc36
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2044.yaml
|
id: GO-2023-2044
modules:
- module: std
versions:
- introduced: 1.21.0-0
- fixed: 1.21.1
vulnerable_at: 1.21.0
packages:
- package: crypto/tls
symbols:
- QUICConn.HandleData
summary: Panic when processing post-handshake message on QUIC connections in crypto/tls
description: |-
Processing an incomplete post-handshake message for a QUIC connection can cause
a panic.
credits:
- Marten Seemann
references:
- report: https://go.dev/issue/62266
- fix: https://go.dev/cl/523039
- web: https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
cve_metadata:
id: CVE-2023-39321
cwe: 'CWE-400: Uncontrolled Resource Consumption'
references:
- https://security.netapp.com/advisory/ntap-20231020-0004/
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2882.yaml
|
id: GO-2024-2882
modules:
- module: github.com/huandu/facebook
vulnerable_at: 1.8.1
- module: github.com/huandu/facebook/v2
versions:
- fixed: 2.7.2
vulnerable_at: 2.7.1
summary: github.com/huandu/facebook may expose access_token in error message.
cves:
- CVE-2024-35232
ghsas:
- GHSA-3f65-m234-9mxr
references:
- advisory: https://github.com/huandu/facebook/security/advisories/GHSA-3f65-m234-9mxr
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-35232
- fix: https://github.com/huandu/facebook/commit/8b34431b91b32903c8821b1d7621bf81a029d8e4
- web: https://cs.opensource.google/go/go/+/refs/tags/go1.22.3:src/net/http/client.go;l=629-633
- web: https://cs.opensource.google/go/go/+/refs/tags/go1.22.3:src/net/url/url.go;l=30
- web: https://github.com/huandu/facebook/blob/1591be276561bbdb019c0279f1d33cb18a650e1b/session.go#L558-L567
source:
id: GHSA-3f65-m234-9mxr
created: 2024-06-26T14:08:22.173849-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0010.yaml
|
id: GO-2020-0010
modules:
- module: github.com/square/go-jose
versions:
- fixed: 1.0.4
vulnerable_at: 1.0.3
packages:
- package: github.com/square/go-jose/cipher
symbols:
- DeriveECDHES
- package: github.com/square/go-jose
symbols:
- JsonWebEncryption.Decrypt
- rawJsonWebKey.ecPublicKey
- ecDecrypterSigner.decryptKey
derived_symbols:
- JsonWebKey.UnmarshalJSON
summary: Elliptic curve key disclosure in github.com/square/go-jose
description: |-
When using ECDH-ES an attacker can mount an invalid curve attack during
decryption as the supplied public key is not checked to be on the same curve as
the receivers private key.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2016-9121
ghsas:
- GHSA-86r9-39j9-99wp
credits:
- Quan Nguyen from Google's Information Security Engineering Team
references:
- fix: https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507
- web: https://www.openwall.com/lists/oss-security/2016/11/03/1
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2846.yaml
|
id: GO-2024-2846
modules:
- module: github.com/containerd/containerd
versions:
- fixed: 1.5.11
- introduced: 1.6.0
- fixed: 1.6.2
vulnerable_at: 1.6.1
packages:
- package: github.com/containerd/containerd/oci
symbols:
- WithDroppedCapabilities
- WithAddedCapabilities
- WithAmbientCapabilities
- WithCapabilities
- populateDefaultUnixSpec
derived_symbols:
- ApplyOpts
- GenerateSpec
- GenerateSpecWithPlatform
summary: Containers started with non-empty inheritable Linux process capabilities in github.com/containerd/containerd
ghsas:
- GHSA-c9cp-9c75-9v8c
references:
- advisory: https://github.com/containerd/containerd/security/advisories/GHSA-c9cp-9c75-9v8c
- fix: https://github.com/containerd/containerd/commit/e9af808591ee1468f9b0ad6a0d41fdf93ee0c1bc
source:
id: GHSA-c9cp-9c75-9v8c
created: 2024-07-01T14:50:25.651568-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2587.yaml
|
id: GO-2024-2587
modules:
- module: github.com/apache/age/drivers/golang
vulnerable_at: 0.0.0-20240221054422-3b2b394eb669
packages:
- package: github.com/apache/age/drivers/golang/age
symbols:
- ExecCypher
- ExecCypherMap
- AgeTx.ExecCypher
- AgeTx.ExecCypherMap
summary: SQL injection in github.com/apache/age/drivers/golang
cves:
- CVE-2022-45786
ghsas:
- GHSA-6p5q-h963-pwwf
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-45786
- web: https://lists.apache.org/thread/of8x0gt5d2vfrm5ksxw55bwn2849ck1w
notes:
- Symbols determined manually from description of vulnerability.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0103.yaml
|
id: GO-2021-0103
modules:
- module: github.com/holiman/uint256
versions:
- introduced: 0.1.0
- fixed: 1.1.1
vulnerable_at: 1.1.0
packages:
- package: github.com/holiman/uint256
symbols:
- udivrem
derived_symbols:
- Int.AddMod
- Int.Div
- Int.Mod
- Int.MulMod
- Int.SDiv
- Int.SMod
summary: Denial of service in github.com/holiman/uint256
description: |-
Due to improper bounds checking, certain mathematical operations can cause a
panic via an out of bounds read. If this package is used to process untrusted
user inputs, this may be used as a vector for a denial of service attack.
published: 2021-07-28T18:08:05Z
cves:
- CVE-2020-26242
ghsas:
- GHSA-jm5c-rv3w-w83m
credits:
- Dima Stebaev
references:
- fix: https://github.com/holiman/uint256/pull/80
- fix: https://github.com/holiman/uint256/commit/6785da6e3eea403260a5760029e722aa4ff1716d
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2017.yaml
|
id: GO-2023-2017
modules:
- module: github.com/weaviate/weaviate
versions:
- fixed: 1.18.6
- introduced: 1.19.0
- fixed: 1.19.13
- introduced: 1.20.0
- fixed: 1.20.6
vulnerable_at: 1.20.5
packages:
- package: github.com/weaviate/weaviate/adapters/handlers/rest
symbols:
- handleUnbatchedGraphQLRequest
derived_symbols:
- Server.ConfigureAPI
- Server.Serve
- Server.SetAPI
summary: Denial of service vulnerability in github.com/weaviate/weaviate
description: |-
A type conversion issue in Weaviate may allow a remote attack that would cause a
denial of service.
cves:
- CVE-2023-38976
ghsas:
- GHSA-8697-479h-5mfp
references:
- advisory: https://github.com/weaviate/weaviate/security/advisories/GHSA-8697-479h-5mfp
- report: https://github.com/weaviate/weaviate/issues/3258
- fix: https://github.com/weaviate/weaviate/pull/3431
- fix: https://github.com/weaviate/weaviate/commit/2a7b208d9aca07e28969e3be82689c184ccf9118
- web: https://github.com/weaviate/weaviate/releases/tag/v1.18.6
- web: https://github.com/weaviate/weaviate/releases/tag/v1.19.13
- web: https://github.com/weaviate/weaviate/releases/tag/v1.20.6
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0012.yaml
|
id: GO-2020-0012
modules:
- module: golang.org/x/crypto
versions:
- fixed: 0.0.0-20200220183623-bac4c82f6975
vulnerable_at: 0.0.0-20200219234226-1ad67e1f0ef4
packages:
- package: golang.org/x/crypto/ssh
symbols:
- parseED25519
- ed25519PublicKey.Verify
- parseSKEd25519
- skEd25519PublicKey.Verify
- NewPublicKey
derived_symbols:
- CertChecker.Authenticate
- CertChecker.CheckCert
- CertChecker.CheckHostKey
- Certificate.Verify
- Dial
- NewClientConn
- NewServerConn
- NewSignerFromKey
- NewSignerFromSigner
- ParseAuthorizedKey
- ParseKnownHosts
- ParsePrivateKey
- ParsePrivateKeyWithPassphrase
- ParsePublicKey
- ParseRawPrivateKey
- ParseRawPrivateKeyWithPassphrase
summary: |-
Panic due to improper verification of cryptographic signatures in
golang.org/x/crypto/ssh
description: |-
An attacker can craft an ssh-ed25519 or sk-ssh-ed25519@openssh.com public key,
such that the library will panic when trying to verify a signature with it. If
verifying signatures using user supplied public keys, this may be used as a
denial of service vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-9283
ghsas:
- GHSA-ffhg-7mh4-33c4
credits:
- Alex Gaynor, Fish in a Barrel
references:
- fix: https://go.dev/cl/220357
- fix: https://go.googlesource.com/crypto/+/bac4c82f69751a6dd76e702d54b3ceb88adab236
- web: https://groups.google.com/g/golang-announce/c/3L45YRc91SY
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2446.yaml
|
id: GO-2024-2446
modules:
- module: github.com/mattermost/mattermost-server
vulnerable_at: 9.9.0+incompatible
- module: github.com/mattermost/mattermost-server/v5
vulnerable_at: 5.39.3
- module: github.com/mattermost/mattermost-server/v6
vulnerable_at: 6.7.2
- module: github.com/mattermost/mattermost/server/v8
non_go_versions:
- fixed: 8.1.7
vulnerable_at: 8.0.0-20240626184126-817e18414e41
summary: Mattermost Cross-site Scripting vulnerability in github.com/mattermost/mattermost-server
cves:
- CVE-2023-7113
ghsas:
- GHSA-h3gq-j7p9-x3p4
unknown_aliases:
- BIT-mattermost-2023-7113
- CGA-pcxv-43r4-92mm
references:
- advisory: https://github.com/advisories/GHSA-h3gq-j7p9-x3p4
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-7113
- web: https://mattermost.com/security-updates
source:
id: GHSA-h3gq-j7p9-x3p4
created: 2024-06-26T16:12:13.229043-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0107.yaml
|
id: GO-2021-0107
modules:
- module: github.com/ecnepsnai/web
versions:
- introduced: 1.4.0
- fixed: 1.5.2
vulnerable_at: 1.5.1
packages:
- package: github.com/ecnepsnai/web
symbols:
- Server.socketHandler
derived_symbols:
- Server.Socket
summary: Panic or authentication bypass in github.com/ecnepsnai/web
description: |-
Web Sockets do not execute any AuthenticateMethod methods which may be set,
leading to a nil pointer dereference if the returned UserData pointer is assumed
to be non-nil, or authentication bypass.
This issue only affects WebSockets with an AuthenticateMethod hook. Request
handlers that do not explicitly use WebSockets are not vulnerable.
published: 2021-07-28T18:08:05Z
ghsas:
- GHSA-5gjg-jgh4-gppm
- GHSA-jpgg-cp2x-qrw3
references:
- fix: https://github.com/ecnepsnai/web/commit/5a78f8d5c41ce60dcf9f61aaf47a7a8dc3e0002f
cve_metadata:
id: CVE-2021-4236
cwe: 'CWE-400: Uncontrolled Resource Consumption'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0068.yaml
|
id: GO-2021-0068
modules:
- module: cmd
versions:
- fixed: 1.14.14
- introduced: 1.15.0-0
- fixed: 1.15.7
vulnerable_at: 1.15.6
packages:
- package: cmd/go
goos:
- windows
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Arbitrary code injection via the go command with cgo on Windows in cmd/go
description: |-
The go command may execute arbitrary code at build time when using cgo on
Windows. This can be triggered by running go get on a malicious module, or any
other time the code is built.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2021-3115
credits:
- RyotaK
references:
- fix: https://go.dev/cl/284783
- fix: https://go.googlesource.com/go/+/953d1feca9b21af075ad5fc8a3dad096d3ccc3a0
- report: https://go.dev/issue/43783
- web: https://groups.google.com/g/golang-announce/c/mperVMGa98w/m/yo5W5wnvAAAJ
- fix: https://go.dev/cl/284780
- fix: https://go.googlesource.com/go/+/46e2e2e9d99925bbf724b12693c6d3e27a95d6a0
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2694.yaml
|
id: GO-2024-2694
modules:
- module: github.com/cosmos/ibc-go
vulnerable_at: 1.5.0
- module: github.com/cosmos/ibc-go/v2
vulnerable_at: 2.5.0
- module: github.com/cosmos/ibc-go/v3
vulnerable_at: 3.4.0
- module: github.com/cosmos/ibc-go/v4
versions:
- fixed: 4.6.0
vulnerable_at: 4.5.1
packages:
- package: github.com/cosmos/ibc-go/v4/modules/core/keeper
symbols:
- Keeper.Timeout
- Keeper.TimeoutOnClose
skip_fix: does not build without replace directives
- module: github.com/cosmos/ibc-go/v5
versions:
- fixed: 5.4.0
vulnerable_at: 5.3.2
packages:
- package: github.com/cosmos/ibc-go/v5/modules/core/keeper
symbols:
- Keeper.Timeout
- Keeper.TimeoutOnClose
skip_fix: does not build without replace directives
- module: github.com/cosmos/ibc-go/v6
versions:
- fixed: 6.3.0
vulnerable_at: 6.2.2
packages:
- package: github.com/cosmos/ibc-go/v6/modules/core/keeper
symbols:
- Keeper.Timeout
- Keeper.TimeoutOnClose
skip_fix: does not build without replace directives
- module: github.com/cosmos/ibc-go/v7
versions:
- fixed: 7.4.0
vulnerable_at: 7.3.2
packages:
- package: github.com/cosmos/ibc-go/v7/modules/core/keeper
symbols:
- Keeper.Timeout
- Keeper.TimeoutOnClose
- module: github.com/cosmos/ibc-go/v8
versions:
- fixed: 8.2.0
vulnerable_at: 8.1.1
packages:
- package: github.com/cosmos/ibc-go/v8/modules/core/keeper
symbols:
- Keeper.Timeout
- Keeper.TimeoutOnClose
summary: |-
Potential Reentrancy using Timeout Callbacks in ibc-hooks in
github.com/cosmos/ibc-go
ghsas:
- GHSA-j496-crgh-34mx
references:
- advisory: https://github.com/cosmos/ibc-go/security/advisories/GHSA-j496-crgh-34mx
- fix: https://github.com/cosmos/ibc-go/commit/04275aa77644dec97fb91b749d963c992591b7f7
- fix: https://github.com/cosmos/ibc-go/commit/278fa89f192af04af32d82fd5ef41f84f82edd97
- fix: https://github.com/cosmos/ibc-go/commit/5e2e9ebc2f67df324028dd36a1837ffcc8e6b0dd
- fix: https://github.com/cosmos/ibc-go/commit/a0185df3953070ba5ebcb66735925449d1dbe729
- fix: https://github.com/cosmos/ibc-go/commit/e78b3a2b9c9ce80a67d6b1c2b7f9abcb225cc219
source:
id: GHSA-j496-crgh-34mx
created: 2024-05-17T15:08:00.659618-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0532.yaml
|
id: GO-2022-0532
modules:
- module: std
versions:
- fixed: 1.17.11
- introduced: 1.18.0-0
- fixed: 1.18.3
vulnerable_at: 1.18.2
packages:
- package: os/exec
goos:
- windows
symbols:
- Cmd.Start
summary: Empty Cmd.Path can trigger unintended binary in os/exec on Windows
description: |-
On Windows, executing Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when
Cmd.Path is unset will unintentionally trigger execution of any binaries in the
working directory named either "..com" or "..exe".
published: 2022-07-26T21:41:20Z
credits:
- Chris Darroch (chrisd8088@github.com)
- brian m. carlson (bk2204@github.com)
- Mikhail Shcherbakov (https://twitter.com/yu5k3)
references:
- fix: https://go.dev/cl/403759
- fix: https://go.googlesource.com/go/+/960ffa98ce73ef2c2060c84c7ac28d37a83f345e
- report: https://go.dev/issue/52574
- web: https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg/m/IWz5T6x7AAAJ
cve_metadata:
id: CVE-2022-30580
cwe: 'CWE-94: Improper Control of Generation of Code (''Code Injection'')'
description: |-
Code injection in Cmd.Start in os/exec before Go 1.17.11 and Go 1.18.3 allows
execution of any binaries in the working directory named either "..com" or
"..exe" by calling Cmd.Run, Cmd.Start, Cmd.Output, or Cmd.CombinedOutput when
Cmd.Path is unset.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0075.yaml
|
id: GO-2021-0075
modules:
- module: github.com/ethereum/go-ethereum
versions:
- fixed: 1.8.11
vulnerable_at: 1.8.11-0.20180605071142-7a22e89080b2
packages:
- package: github.com/ethereum/go-ethereum/les
symbols:
- ProtocolManager.handleMsg
skip_fix: 'TODO: revisit this reason (cannot find module providing package github.com/hashicorp/golang-lru)'
summary: |-
Panic due to improper validation of RPC messages in
github.com/ethereum/go-ethereum
description: |-
Due to improper argument validation in RPC messages, a maliciously crafted
message can cause a panic, leading to denial of service.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2018-12018
ghsas:
- GHSA-p5gc-957x-gfw9
references:
- fix: https://github.com/ethereum/go-ethereum/pull/16891
- fix: https://github.com/ethereum/go-ethereum/commit/a5237a27eaf81946a3edb4fafe13ed6359d119e4
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2461.yaml
|
id: GO-2024-2461
modules:
- module: github.com/gofiber/template/django/v3
versions:
- fixed: 3.1.9
vulnerable_at: 3.1.8
packages:
- package: github.com/gofiber/template/django/v3
symbols:
- New
- NewFileSystem
- NewPathForwardingFileSystem
- Engine.Load
- Engine.Render
summary: Cross-site scripting in github.com/gofiber/template/django/v3
cves:
- CVE-2024-22199
ghsas:
- GHSA-4mq2-gc4j-cmw6
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-22199
- fix: https://github.com/gofiber/template/commit/28cff3ac4d4c117ab25b5396954676d624b6cb46
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2433.yaml
|
id: GO-2024-2433
modules:
- module: github.com/cubefs/cubefs
non_go_versions:
- fixed: 3.3.1
vulnerable_at: 2.5.2+incompatible
summary: CubeFS leaks magic secret key when starting Blobstore access service in github.com/cubefs/cubefs
cves:
- CVE-2023-46741
ghsas:
- GHSA-8h2x-gr2c-c275
references:
- advisory: https://github.com/cubefs/cubefs/security/advisories/GHSA-8h2x-gr2c-c275
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-46741
- fix: https://github.com/cubefs/cubefs/commit/972f0275ee8d5dbba4b1530da7c145c269b31ef5
source:
id: GHSA-8h2x-gr2c-c275
created: 2024-06-14T11:34:45.410074-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0528.yaml
|
id: GO-2022-0528
modules:
- module: github.com/containrrr/shoutrrr
versions:
- fixed: 0.6.0
vulnerable_at: 0.5.3
packages:
- package: github.com/containrrr/shoutrrr/pkg/util
symbols:
- PartitionMessage
summary: Panic on crafted messages in github.com/containrrr/shoutrrr
description: |-
Sending a message exactly 2000, 4000, or 6000 characters in length to Discord
causes a panic.
published: 2022-07-30T03:51:17Z
cves:
- CVE-2022-25891
ghsas:
- GHSA-477v-w82m-634j
credits:
- justinsteven
references:
- fix: https://github.com/containrrr/shoutrrr/pull/242
- fix: https://github.com/containrrr/shoutrrr/commit/6a27056f9d7522a8b493216195cb7634bf4b5c42
- web: https://github.com/containrrr/shoutrrr/issues/240
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0017.yaml
|
id: GO-2020-0017
modules:
- module: github.com/dgrijalva/jwt-go
versions:
- introduced: 0.0.0-20150717181359-44718f8a89b0
vulnerable_at: 3.2.0+incompatible
packages:
- package: github.com/dgrijalva/jwt-go
symbols:
- MapClaims.VerifyAudience
- module: github.com/dgrijalva/jwt-go/v4
versions:
- fixed: 4.0.0-preview1
vulnerable_at: 4.0.0-20190408202314-32acca36b99f
packages:
- package: github.com/dgrijalva/jwt-go/v4
symbols:
- MapClaims.VerifyAudience
summary: Authorization bypass in github.com/dgrijalva/jwt-go
description: |-
If a JWT contains an audience claim with an array of strings, rather than a
single string, and MapClaims.VerifyAudience is called with req set to false,
then audience verification will be bypassed, allowing an invalid set of
audiences to be provided.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-26160
ghsas:
- GHSA-w73w-5m7g-f7qc
credits:
- '@christopher-wong'
references:
- fix: https://github.com/dgrijalva/jwt-go/commit/ec0a89a131e3e8567adcb21254a5cd20a70ea4ab
- web: https://github.com/dgrijalva/jwt-go/issues/422
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2442.yaml
|
id: GO-2024-2442
modules:
- module: github.com/gravitational/teleport
non_go_versions:
- introduced: 13.0.0
- fixed: 13.4.13
- introduced: 14.0.0
- fixed: 14.2.4
vulnerable_at: 3.2.17+incompatible
summary: Teleport Access List owners can escalate their privileges in github.com/gravitational/teleport
ghsas:
- GHSA-76cc-p55w-63g3
references:
- advisory: https://github.com/gravitational/teleport/security/advisories/GHSA-76cc-p55w-63g3
source:
id: GHSA-76cc-p55w-63g3
created: 2024-06-14T11:35:01.72578-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2550.yaml
|
id: GO-2024-2550
modules:
- module: github.com/mongodb/mongo-tools
versions:
- fixed: 0.0.0-20200819165540-8c1800b51550
non_go_versions:
- introduced: 3.6.5
- fixed: 3.6.21
- introduced: 4.0.0
- fixed: 4.0.21
- introduced: 4.2.0
- fixed: 4.2.11
- introduced: 100.0.0
- fixed: 100.2.0
vulnerable_at: 0.0.0-20200817142019-cd4a54b5540f
summary: |-
MongoDB Tools Improper Certificate Validation vulnerability in
github.com/mongodb/mongo-tools
description: |-
Usage of specific command line parameter in MongoDB Tools which was originally
intended to just skip hostname checks, may result in MongoDB skipping all
certificate validation. This may result in accepting invalid certificates.
NOTE: this module uses its own versioning scheme that is not fully
compatible with standard Go module versioning, so the affected versions in this
report may differ from the versions listed in other advisories.
According to the advisory, the affected versions are as follows: MongoDB Inc.
MongoDB Database Tools 3.6 versions later than 3.6.5; 3.6 versions prior to
3.6.21; 4.0 versions prior to 4.0.21; 4.2 versions prior to 4.2.11; 100 versions
prior to 100.2.0. MongoDB Inc. Mongomirror 0 versions later than 0.6.0.
cves:
- CVE-2020-7924
ghsas:
- GHSA-6cwm-wm82-hgrw
references:
- advisory: https://github.com/advisories/GHSA-6cwm-wm82-hgrw
- fix: https://github.com/mongodb/mongo-tools/commit/8c1800b5155084f954a39a1f2f259efac3bb86de
- web: https://jira.mongodb.org/browse/TOOLS-2587
source:
id: GHSA-6cwm-wm82-hgrw
created: 2024-07-02T16:16:40.677572-04:00
review_status: REVIEWED
unexcluded: NOT_IMPORTABLE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1567.yaml
|
id: GO-2023-1567
modules:
- module: github.com/caddyserver/caddy/v2
versions:
- fixed: 2.5.0-beta.1
vulnerable_at: 2.4.6
packages:
- package: github.com/caddyserver/caddy/v2/modules/caddyhttp
symbols:
- SanitizedPathJoin
skip_fix: |-
Cannot reproduce with normal vulnreport yet.
After the step `go get github.com/caddyserver/caddy/v2/modules/caddyhttp@v2.4.6`
in vulnreport, run `go1.18 get github.com/lucas-clemente/quic-go@v0.27.2`.
- package: github.com/caddyserver/caddy/v2/modules/caddyhttp/fileserver
symbols:
- FileServer.directoryListing
derived_symbols:
- FileServer.Provision
- FileServer.ServeHTTP
- MatchFile.Match
- MatchFile.UnmarshalCaddyfile
- MatchFile.Validate
- fileInfo.HumanModTime
- fileInfo.HumanSize
- statusOverrideResponseWriter.WriteHeader
skip_fix: See skip_fix for github.com/caddyserver/caddy/v2/modules/caddyhttp
summary: Open redirect in github.com/caddyserver/caddy/v2
description: |-
Due to improper request sanitization, a crafted URL can cause the static file
handler to redirect to an attacker chosen URL, allowing for open redirect
attacks.
cves:
- CVE-2022-28923
ghsas:
- GHSA-qpm3-vr34-h8w8
credits:
- Mayank Mukhi (@Hunt2behunter)
references:
- web: https://lednerb.de/en/publications/responsible-disclosure/caddy-open-redirect-vulnerability/
- fix: https://github.com/caddyserver/caddy/commit/78b5356f2b1945a90de1ef7f2c7669d82098edbd
- advisory: https://github.com/advisories/GHSA-qpm3-vr34-h8w8
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2617.yaml
|
id: GO-2024-2617
modules:
- module: github.com/hashicorp/vault
versions:
- fixed: 1.14.10
- introduced: 1.15.0
- fixed: 1.15.5
vulnerable_at: 1.15.4
summary: Authentication bypass in github.com/hashicorp/vault
description: |-
The TLS certificate authentication method incorrectly validates client
certificates when configured with a non-CA certificate as a trusted certificate.
When configured this way, attackers may be able to craft a certificate that can
be used to bypass authentication.
cves:
- CVE-2024-2048
ghsas:
- GHSA-r3w7-mfpm-c2vw
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-2048
- web: https://discuss.hashicorp.com/t/hcsec-2024-05-vault-cert-auth-method-did-not-correctly-validate-non-ca-certificates/63382
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2631.yaml
|
id: GO-2024-2631
modules:
- module: github.com/go-jose/go-jose/v4
versions:
- fixed: 4.0.1
vulnerable_at: 4.0.0
packages:
- package: github.com/go-jose/go-jose/v4
symbols:
- inflate
derived_symbols:
- JSONWebEncryption.Decrypt
- JSONWebEncryption.DecryptMulti
- module: github.com/go-jose/go-jose/v3
versions:
- fixed: 3.0.3
vulnerable_at: 3.0.2
packages:
- package: github.com/go-jose/go-jose/v3
symbols:
- inflate
derived_symbols:
- JSONWebEncryption.Decrypt
- JSONWebEncryption.DecryptMulti
- module: gopkg.in/go-jose/go-jose.v2
versions:
- fixed: 2.6.3
vulnerable_at: 2.6.2
packages:
- package: gopkg.in/go-jose/go-jose.v2
symbols:
- inflate
derived_symbols:
- JSONWebEncryption.Decrypt
- JSONWebEncryption.DecryptMulti
- module: gopkg.in/square/go-jose.v2
vulnerable_at: 2.6.0
packages:
- package: gopkg.in/square/go-jose.v2
symbols:
- inflate
derived_symbols:
- JSONWebEncryption.Decrypt
- JSONWebEncryption.DecryptMulti
summary: Decompression bomb vulnerability in github.com/go-jose/go-jose
description: |-
An attacker could send a JWE containing compressed data that used large amounts
of memory and CPU when decompressed by Decrypt or DecryptMulti.
cves:
- CVE-2024-28180
ghsas:
- GHSA-c5q2-7r4c-mv6g
credits:
- zer0yu
- chenjj
references:
- advisory: https://github.com/go-jose/go-jose/security/advisories/GHSA-c5q2-7r4c-mv6g
- fix: https://github.com/go-jose/go-jose/commit/0dd4dd541c665fb292d664f77604ba694726f298
- fix: https://github.com/go-jose/go-jose/commit/add6a284ea0f844fd6628cba637be5451fe4b28a
- fix: https://github.com/go-jose/go-jose/commit/f4c051a0653d78199a053892f7619ebf96339502
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1519.yaml
|
id: GO-2023-1519
modules:
- module: github.com/rancher/wrangler
versions:
- fixed: 0.7.4-security1
- introduced: 0.8.0
- fixed: 0.8.5-security1
- introduced: 0.8.6
- fixed: 0.8.11
- introduced: 1.0.0
- fixed: 1.0.1
vulnerable_at: 1.0.0
packages:
- package: github.com/rancher/wrangler/pkg/git
symbols:
- Git.Clone
- Git.fetchAndReset
- Git.reset
- Git.gitCmd
derived_symbols:
- Git.Ensure
- Git.Head
- Git.LsRemote
- Git.Update
summary: Command injection in github.com/rancher/wrangler
description: |-
A command injection vulnerability exists in the Wrangler Git package. Specially
crafted commands can be passed to Wrangler that will change their behavior and
cause confusion when executed through Git, resulting in command injection in the
underlying host.
A workaround is to sanitize input passed to the Git package to remove potential
unsafe and ambiguous characters. Otherwise, the best course of action is to
update to a patched Wrangler version.
cves:
- CVE-2022-31249
ghsas:
- GHSA-qrg7-hfx7-95c5
references:
- advisory: https://github.com/advisories/GHSA-qrg7-hfx7-95c5
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1188.yaml
|
id: GO-2022-1188
modules:
- module: code.sajari.com/docconv
versions:
- fixed: 1.2.1
vulnerable_at: 1.2.0
packages:
- package: code.sajari.com/docconv/docd
symbols:
- serve
derived_symbols:
- main
summary: Uncontrolled memory allocation in code.sajari.com/docconv
description: |-
An attacker can remotely supply a specially crafted input that causes
uncontrolled memory allocation.
cves:
- CVE-2022-4741
ghsas:
- GHSA-qvx2-59g8-8hph
references:
- fix: https://github.com/sajari/docconv/commit/42bcff666855ab978e67a9041d0cdea552f20301
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2977.yaml
|
id: GO-2024-2977
modules:
- module: github.com/google/nftables
versions:
- introduced: 0.1.0
- fixed: 0.2.0
vulnerable_at: 0.1.0
packages:
- package: github.com/google/nftables
symbols:
- Conn.AddSet
skip_fix: 'errors of the form ''undefined: unix.*'''
summary: IP addresses were encoded in the wrong byte order in github.com/google/nftables
description: |-
IP addresses were encoded in the wrong byte order, resulting in an nftables
configuration which did not work as intended (might block or not block the
desired addresses).
cves:
- CVE-2024-6284
ghsas:
- GHSA-qjvf-8748-9w7h
references:
- advisory: https://github.com/advisories/GHSA-qjvf-8748-9w7h
- fix: https://github.com/google/nftables/commit/b1f901b05510bed05c232c5049f68d1511b56a19
- report: https://github.com/google/nftables/issues/225
- web: https://bugs.launchpad.net/ubuntu/+source/crowdsec-firewall-bouncer/+bug/2069596
- web: https://github.com/crowdsecurity/cs-firewall-bouncer/issues/368
source:
id: GHSA-qjvf-8748-9w7h
created: 2024-07-08T13:23:25.436858-04:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1751.yaml
|
id: GO-2023-1751
modules:
- module: std
versions:
- fixed: 1.19.9
- introduced: 1.20.0-0
- fixed: 1.20.4
vulnerable_at: 1.20.3
packages:
- package: html/template
symbols:
- cssValueFilter
- escaper.commit
derived_symbols:
- Template.Execute
- Template.ExecuteTemplate
summary: Improper sanitization of CSS values in html/template
description: |-
Angle brackets (<>) are not considered dangerous characters when inserted into
CSS contexts. Templates containing multiple actions separated by a '/' character
can result in unexpectedly closing the CSS context and allowing for injection of
unexpected HTML, if executed with untrusted input.
credits:
- Juho Nurminen of Mattermost
references:
- report: https://go.dev/issue/59720
- fix: https://go.dev/cl/491615
- web: https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU
cve_metadata:
id: CVE-2023-24539
cwe: 'CWE-74: Improper input validation'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-2041.yaml
|
id: GO-2023-2041
modules:
- module: std
versions:
- fixed: 1.20.8
- introduced: 1.21.0-0
- fixed: 1.21.1
vulnerable_at: 1.21.0
packages:
- package: html/template
symbols:
- isComment
- escaper.escapeText
- tJS
- tLineCmt
derived_symbols:
- Template.Execute
- Template.ExecuteTemplate
summary: Improper handling of HTML-like comments in script contexts in html/template
description: |-
The html/template package does not properly handle HTML-like "" comment tokens,
nor hashbang "#!" comment tokens, in <script> contexts. This may cause the
template parser to improperly interpret the contents of <script> contexts,
causing actions to be improperly escaped. This may be leveraged to perform an
XSS attack.
credits:
- Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.)
references:
- report: https://go.dev/issue/62196
- fix: https://go.dev/cl/526156
- web: https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
cve_metadata:
id: CVE-2023-39318
cwe: 'CWE-79: Improper Neutralization of Input During Web Page Generation (''Cross-site Scripting'')'
references:
- https://security.netapp.com/advisory/ntap-20231020-0009/
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0476.yaml
|
id: GO-2022-0476
modules:
- module: cmd
versions:
- fixed: 1.14.12
- introduced: 1.15.0-0
- fixed: 1.15.5
vulnerable_at: 1.15.4
packages:
- package: cmd/go
symbols:
- validCompilerFlags
skip_fix: 'TODO: revisit this reason (cant request explicit version v1.15.4 of standard library package cmd/go)'
summary: Arbitrary code execution via the go command with cgo in cmd/go
description: |-
The go command may execute arbitrary code at build time when cgo is in use. This
may occur when running go get on a malicious package, or any other command that
builds untrusted code.
This can be caused by malicious gcc flags specified via a cgo directive.
published: 2022-07-28T17:24:43Z
credits:
- Imre Rad
references:
- fix: https://go.dev/cl/267277
- fix: https://go.googlesource.com/go/+/da7aa86917811a571e6634b45a457f918b8e6561
- report: https://go.dev/issue/42556
- web: https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
cve_metadata:
id: CVE-2020-28367
cwe: 'CWE-94: Improper Control of Generation of Code (''Code Injection'')'
description: |-
Code injection in the go command with cgo before Go 1.14.12 and Go 1.15.5 allows
arbitrary code execution at build time via malicious gcc flags specified via a
#cgo directive.
references:
- https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2618.yaml
|
id: GO-2024-2618
modules:
- module: github.com/cloudevents/sdk-go/v2
versions:
- fixed: 2.15.2
vulnerable_at: 2.15.1
packages:
- package: github.com/cloudevents/sdk-go/v2/protocol/http
symbols:
- New
summary: Authentication token leak in github.com/cloudevents/sdk-go/v2
description: |-
Using cloudevents.WithRoundTripper to create a cloudevents.Client with an
authenticated http.RoundTripper causes the go-sdk to leak credentials to
arbitrary endpoints. When the transport is populated with an authenticated
transport, http.DefaultClient is modified with the authenticated transport and
will start to send Authorization tokens to any endpoint it is used to contact.
cves:
- CVE-2024-28110
ghsas:
- GHSA-5pf6-2qwx-pxm2
credits:
- mattmoor
- tcnghia
references:
- advisory: https://github.com/cloudevents/sdk-go/security/advisories/GHSA-5pf6-2qwx-pxm2
- fix: https://github.com/cloudevents/sdk-go/commit/de2f28370b0d2a0f64f92c0c6139fa4b8a7c3851
- web: https://github.com/cloudevents/sdk-go/blob/67e389964131d55d65cd14b4eb32d57a47312695/v2/protocol/http/protocol.go#L104-L110
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2540.yaml
|
id: GO-2024-2540
modules:
- module: github.com/mattermost/mattermost-plugin-jira
non_go_versions:
- fixed: 4.0.0-rc1
vulnerable_at: 1.1.1
summary: Mattermost Jira Plugin does not properly check security levels in github.com/mattermost/mattermost-plugin-jira
cves:
- CVE-2024-24774
ghsas:
- GHSA-qr8f-cjw7-838m
unknown_aliases:
- BIT-mattermost-2024-24774
references:
- advisory: https://github.com/advisories/GHSA-qr8f-cjw7-838m
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-24774
- fix: https://github.com/mattermost/mattermost-plugin-jira/commit/5f5e084d169bf6b82d5c46a7a7eb033e1a01c6de
- web: https://mattermost.com/security-updates
source:
id: GHSA-qr8f-cjw7-838m
created: 2024-06-14T11:41:03.591421-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0142.yaml
|
id: GO-2021-0142
modules:
- module: std
versions:
- fixed: 1.13.15
- introduced: 1.14.0-0
- fixed: 1.14.7
vulnerable_at: 1.14.6
packages:
- package: encoding/binary
symbols:
- ReadUvarint
- ReadVarint
summary: Unbounded read from invalid inputs in encoding/binary
description: |-
ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid
inputs.
Certain invalid inputs to ReadUvarint or ReadVarint can cause these functions to
read an unlimited number of bytes from the ByteReader parameter before returning
an error. This can lead to processing more input than expected when the caller
is reading directly from a network and depends on ReadUvarint or ReadVarint only
consuming a small, bounded number of bytes, even from invalid inputs.
published: 2022-07-01T20:11:09Z
cves:
- CVE-2020-16845
ghsas:
- GHSA-q6gq-997w-f55g
credits:
- Diederik Loerakker
- Jonny Rhea
- Raúl Kripalani
- Preston Van Loon
references:
- fix: https://go.dev/cl/247120
- fix: https://go.googlesource.com/go/+/027d7241ce050d197e7fabea3d541ffbe3487258
- report: https://go.dev/issue/40618
- web: https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0177.yaml
|
id: GO-2022-0177
modules:
- module: cmd
versions:
- fixed: 1.8.4
- introduced: 1.9.0-0
- fixed: 1.9.1
vulnerable_at: 1.9.0
packages:
- package: cmd/go
skip_fix: 'TODO: revisit this reason (cant request explicit version of standard library package cmd/go)'
summary: Remote command execution via "go get" in cmd/go
description: |-
The "go get" command allows remote command execution.
Using custom domains, it is possible to arrange things so that example.com/pkg1
points to a Subversion repository but example.com/pkg1/pkg2 points to a Git
repository. If the Subversion repository includes a Git checkout in its pkg2
directory and some other work is done to ensure the proper ordering of
operations, "go get" can be tricked into reusing this Git checkout for the fetch
of code from pkg2. If the Subversion repository's Git checkout has malicious
commands in .git/hooks/, they will execute on the system running "go get".
published: 2022-08-09T17:31:35Z
cves:
- CVE-2017-15041
credits:
- Simon Rawet
references:
- fix: https://go.dev/cl/68110
- fix: https://go.googlesource.com/go/+/ec71ee078fd3243b78c0d404c8634bd97e38d7eb
- report: https://go.dev/issue/22125
- web: https://groups.google.com/g/golang-dev/c/RinSE3EiJBI/m/kYL7zb07AgAJ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2598.yaml
|
id: GO-2024-2598
modules:
- module: std
versions:
- fixed: 1.21.8
- introduced: 1.22.0-0
- fixed: 1.22.1
vulnerable_at: 1.22.0
packages:
- package: crypto/x509
symbols:
- Certificate.buildChains
derived_symbols:
- Certificate.Verify
summary: |-
Verify panics on certificates with an unknown public key algorithm in
crypto/x509
description: |-
Verifying a certificate chain which contains a certificate with an unknown
public key algorithm will cause Certificate.Verify to panic.
This affects all crypto/tls clients, and servers that set Config.ClientAuth to
VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is
for TLS servers to not verify client certificates.
credits:
- John Howard (Google)
references:
- report: https://go.dev/issue/65390
- fix: https://go.dev/cl/569339
- web: https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg
cve_metadata:
id: CVE-2024-24783
cwe: 'CWE-476: NULL Pointer Dereference'
references:
- https://security.netapp.com/advisory/ntap-20240329-0005/
- http://www.openwall.com/lists/oss-security/2024/03/08/4
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2500.yaml
|
id: GO-2024-2500
modules:
- module: github.com/docker/docker
versions:
- fixed: 20.10.9+incompatible
vulnerable_at: 20.10.8+incompatible
packages:
- package: github.com/docker/docker/daemon
symbols:
- Daemon.setupContainerMountsRoot
- Daemon.create
- NewDaemon
- setupDaemonRoot
skip_fix: fix does not work due to incompatible versions
- package: github.com/docker/docker/daemon/graphdriver/aufs
symbols:
- Init
skip_fix: fix does not work due to incompatible versions
- package: github.com/docker/docker/daemon/graphdriver/btrfs
symbols:
- Init
- Driver.Create
skip_fix: fix does not work due to incompatible versions
- package: github.com/docker/docker/daemon/graphdriver/fuse-overlayfs
symbols:
- Init
- Driver.create
skip_fix: fix does not work due to incompatible versions
- package: github.com/docker/docker/daemon/graphdriver/overlay
symbols:
- Init
- Driver.Create
skip_fix: fix does not work due to incompatible versions
- package: github.com/docker/docker/daemon/graphdriver/overlay2
symbols:
- Init
- Driver.create
skip_fix: fix does not work due to incompatible versions
- package: github.com/docker/docker/daemon/graphdriver/vfs
symbols:
- Init
- Driver.Create
skip_fix: fix does not work due to incompatible versions
- package: github.com/docker/docker/daemon/graphdriver/zfs
symbols:
- Init
skip_fix: fix does not work due to incompatible versions
- module: github.com/moby/moby
versions:
- fixed: 20.10.9+incompatible
vulnerable_at: 20.10.8+incompatible
packages:
- package: github.com/moby/moby/daemon
symbols:
- Daemon.setupContainerMountsRoot
- Daemon.create
- NewDaemon
- setupDaemonRoot
skip_fix: fix does not work due to incompatible versions
- package: github.com/moby/moby/daemon/graphdriver/aufs
symbols:
- Init
skip_fix: fix does not work due to incompatible versions
- package: github.com/moby/moby/daemon/graphdriver/btrfs
symbols:
- Init
- Driver.Create
skip_fix: fix does not work due to incompatible versions
- package: github.com/moby/moby/daemon/graphdriver/fuse-overlayfs
symbols:
- Init
- Driver.create
skip_fix: fix doesn't work due to build tags
- package: github.com/moby/moby/daemon/graphdriver/overlay
symbols:
- Init
- Driver.Create
skip_fix: fix does not work due to incompatible versions
- package: github.com/moby/moby/daemon/graphdriver/overlay2
symbols:
- Init
- Driver.create
skip_fix: fix does not work due to incompatible versions
- package: github.com/moby/moby/daemon/graphdriver/vfs
symbols:
- Init
- Driver.Create
skip_fix: fix does not work due to incompatible versions
- package: github.com/moby/moby/daemon/graphdriver/zfs
symbols:
- Init
skip_fix: fix does not work due to incompatible versions
summary: Moby (Docker Engine) Insufficiently restricted permissions on data directory in github.com/docker/docker
cves:
- CVE-2021-41091
ghsas:
- GHSA-3fwx-pjgw-3558
credits:
- Joan Bruguera
references:
- advisory: https://github.com/moby/moby/security/advisories/GHSA-3fwx-pjgw-3558
- fix: https://github.com/moby/moby/commit/f0ab919f518c47240ea0e72d0999576bb8008e64
source:
id: GHSA-3fwx-pjgw-3558
created: 2024-07-01T15:02:17.770473-04:00
review_status: REVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2582.yaml
|
id: GO-2024-2582
modules:
- module: github.com/stacklok/minder
non_go_versions:
- fixed: 0.20240226.1425
vulnerable_at: 0.0.51
summary: Minder trusts client-provided mapping from repo name to upstream ID in github.com/stacklok/minder
cves:
- CVE-2024-27093
ghsas:
- GHSA-q6h8-4j2v-pjg4
references:
- advisory: https://github.com/stacklok/minder/security/advisories/GHSA-q6h8-4j2v-pjg4
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-27093
- fix: https://github.com/stacklok/minder/commit/53868a878e93f29c43437f96dbc990b548e48d1d
source:
id: GHSA-q6h8-4j2v-pjg4
created: 2024-06-14T11:42:26.439797-04:00
review_status: UNREVIEWED
unexcluded: NOT_IMPORTABLE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0008.yaml
|
id: GO-2020-0008
modules:
- module: github.com/miekg/dns
versions:
- fixed: 1.1.25-0.20191211073109-8ebf2e419df7
vulnerable_at: 1.1.24
packages:
- package: github.com/miekg/dns
symbols:
- id
derived_symbols:
- Msg.SetAxfr
- Msg.SetIxfr
- Msg.SetNotify
- Msg.SetQuestion
- Msg.SetUpdate
summary: Insecure generation of random numbers in github.com/miekg/dns
description: |-
DNS message transaction IDs are generated using math/rand which makes them
relatively predictable. This reduces the complexity of response spoofing attacks
against DNS clients.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2019-19794
ghsas:
- GHSA-44r7-7p62-q3fr
references:
- fix: https://github.com/miekg/dns/pull/1044
- fix: https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33
- web: https://github.com/miekg/dns/issues/1037
- web: https://github.com/miekg/dns/issues/1043
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2642.yaml
|
id: GO-2024-2642
modules:
- module: github.com/pterodactyl/wings
versions:
- fixed: 1.11.9
vulnerable_at: 1.11.8
summary: Pterodactyl Wings vulnerable to improper isolation of server file access in github.com/pterodactyl/wings
cves:
- CVE-2024-27102
ghsas:
- GHSA-494h-9924-xww9
references:
- advisory: https://github.com/pterodactyl/wings/security/advisories/GHSA-494h-9924-xww9
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-27102
- fix: https://github.com/pterodactyl/wings/commit/d1c0ca526007113a0f74f56eba99511b4e989287
source:
id: GHSA-494h-9924-xww9
created: 2024-05-17T16:14:39.536444-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2690.yaml
|
id: GO-2024-2690
modules:
- module: github.com/hashicorp/vault
versions:
- fixed: 1.16.0
vulnerable_at: 1.16.0-rc3
summary: HashiCorpVault does not correctly validate OCSP responses in github.com/hashicorp/vault
cves:
- CVE-2024-2660
ghsas:
- GHSA-j2rp-gmqv-frhv
unknown_aliases:
- BIT-vault-2024-2660
references:
- advisory: https://github.com/advisories/GHSA-j2rp-gmqv-frhv
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-2660
- web: https://discuss.hashicorp.com/t/hcsec-2024-07-vault-tls-cert-auth-method-did-not-correctly-validate-ocsp-responses/64573
- web: https://security.netapp.com/advisory/ntap-20240524-0007
source:
id: GHSA-j2rp-gmqv-frhv
created: 2024-06-26T13:59:09.265191-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2864.yaml
|
id: GO-2024-2864
modules:
- module: github.com/stacklok/minder
versions:
- fixed: 0.0.49
vulnerable_at: 0.0.48
summary: Denial of service of Minder Server with attacker-controlled REST endpoint in github.com/stacklok/minder
cves:
- CVE-2024-35185
ghsas:
- GHSA-fjw8-3gp8-4cvx
references:
- advisory: https://github.com/stacklok/minder/security/advisories/GHSA-fjw8-3gp8-4cvx
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-35185
- fix: https://github.com/stacklok/minder/commit/065049336aac0621ee00a0bb2211f8051d47c14b
source:
id: GHSA-fjw8-3gp8-4cvx
created: 2024-05-16T17:13:21.902381-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0493.yaml
|
id: GO-2022-0493
modules:
- module: std
versions:
- fixed: 1.17.10
- introduced: 1.18.0-0
- fixed: 1.18.2
vulnerable_at: 1.18.1
packages:
- package: syscall
symbols:
- Faccessat
- module: golang.org/x/sys
versions:
- fixed: 0.0.0-20220412211240-33da011f77ad
vulnerable_at: 0.0.0-20220412071739-889880a91fd5
packages:
- package: golang.org/x/sys/unix
symbols:
- Faccessat
excluded_symbols:
- Access
summary: Incorrect privilege reporting in syscall and golang.org/x/sys/unix
description: |-
When called with a non-zero flags parameter, the Faccessat function can
incorrectly report that a file is accessible.
published: 2022-07-15T23:30:12Z
cves:
- CVE-2022-29526
ghsas:
- GHSA-p782-xgp4-8hr8
credits:
- Joël Gähwiler (@256dpi)
references:
- fix: https://go.dev/cl/399539
- report: https://go.dev/issue/52313
- fix: https://go.dev/cl/400074
- web: https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2501.yaml
|
id: GO-2024-2501
modules:
- module: github.com/hashicorp/consul
versions:
- introduced: 1.7.0
- fixed: 1.7.9
- introduced: 1.8.0
- fixed: 1.8.5
vulnerable_at: 1.8.4
summary: Denial of service in HashiCorp Consul in github.com/hashicorp/consul
cves:
- CVE-2020-25201
ghsas:
- GHSA-496g-fr33-whrf
unknown_aliases:
- BIT-consul-2020-25201
references:
- advisory: https://github.com/advisories/GHSA-496g-fr33-whrf
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-25201
- fix: https://github.com/hashicorp/consul/pull/9024
- web: https://github.com/hashicorp/consul/blob/master/CHANGELOG.md#185-october-23-2020
- web: https://github.com/hashicorp/consul/releases/tag/v1.8.5
- web: https://security.gentoo.org/glsa/202208-09
- web: https://www.hashicorp.com/blog/category/consul
source:
id: GHSA-496g-fr33-whrf
created: 2024-06-14T11:38:16.725105-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2462.yaml
|
id: GO-2024-2462
modules:
- module: github.com/0xJacky/Nginx-UI
versions:
- fixed: 1.9.10-0.20231219184941-827e76c46e63
vulnerable_at: 1.9.10-0.20231219042952-0a9e23daf406
packages:
- package: github.com/0xJacky/Nginx-UI/api/system
symbols:
- GetSettings
- SaveSettings
summary: Arbitrary command execution in github.com/0xJacky/Nginx-UI
cves:
- CVE-2024-22198
ghsas:
- GHSA-8r25-68wm-jw35
credits:
- '@jorgectf'
references:
- fix: https://github.com/0xJacky/nginx-ui/commit/827e76c46e63c52114a62a899f61313039c754e3
- advisory: https://github.com/advisories/GHSA-8r25-68wm-jw35
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2924.yaml
|
id: GO-2024-2924
modules:
- module: github.com/AdguardTeam/AdGuardHome
non_go_versions:
- introduced: 0.93.0
unsupported_versions:
- last_affected: 0.107.51
vulnerable_at: 0.107.51
summary: AdGuardHome privilege escalation vulnerability in github.com/AdguardTeam/AdGuardHome
cves:
- CVE-2024-36586
ghsas:
- GHSA-7jp9-vgmq-c8r5
references:
- advisory: https://github.com/advisories/GHSA-7jp9-vgmq-c8r5
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-36586
- web: https://github.com/go-compile/security-advisories/blob/master/vulns/CVE-2024-36586.md
source:
id: GHSA-7jp9-vgmq-c8r5
created: 2024-06-27T15:54:33.634108-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2750.yaml
|
id: GO-2024-2750
modules:
- module: github.com/Azure/secrets-store-csi-driver-provider-azure
non_go_versions:
- fixed: 0.0.10
vulnerable_at: 1.5.2
- module: github.com/GoogleCloudPlatform/secrets-store-csi-driver-provider-gcp
versions:
- fixed: 0.2.0
vulnerable_at: 0.1.0
- module: github.com/hashicorp/vault-csi-provider
non_go_versions:
- fixed: 0.0.6
vulnerable_at: 1.4.2
summary: Kubernetes Secrets Store CSI Driver plugins arbitrary file write in github.com/Azure/secrets-store-csi-driver-provider-azure
cves:
- CVE-2020-8567
ghsas:
- GHSA-2v35-wj4r-rcmv
references:
- advisory: https://github.com/advisories/GHSA-2v35-wj4r-rcmv
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-8567
- fix: https://github.com/Azure/secrets-store-csi-driver-provider-azure/pull/298
- fix: https://github.com/GoogleCloudPlatform/secrets-store-csi-driver-provider-gcp/pull/74
- web: https://github.com/hashicorp/secrets-store-csi-driver-provider-vault/pull/50
- web: https://github.com/kubernetes-sigs/secrets-store-csi-driver/issues/384
- web: https://groups.google.com/g/kubernetes-secrets-store-csi-driver/c/BI2qisiNXHY
source:
id: GHSA-2v35-wj4r-rcmv
created: 2024-06-04T15:29:24.764705-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0020.yaml
|
id: GO-2020-0020
modules:
- module: github.com/gorilla/handlers
versions:
- fixed: 1.3.0
vulnerable_at: 1.2.1
packages:
- package: github.com/gorilla/handlers
symbols:
- cors.ServeHTTP
summary: Improper access control in github.com/gorilla/handlers
description: |-
Usage of the CORS handler may apply improper CORS headers, allowing the
requester to explicitly control the value of the Access-Control-Allow-Origin
header, which bypasses the expected behavior of the Same Origin Policy.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-jcr6-mmjj-pchw
credits:
- Evan J Johnson
references:
- fix: https://github.com/gorilla/handlers/pull/116
- fix: https://github.com/gorilla/handlers/commit/90663712d74cb411cbef281bc1e08c19d1a76145
cve_metadata:
id: CVE-2017-20146
cwe: 'CWE 284: Improper Access Control'
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0242.yaml
|
id: GO-2021-0242
modules:
- module: std
versions:
- fixed: 1.15.13
- introduced: 1.16.0-0
- fixed: 1.16.5
vulnerable_at: 1.16.4
packages:
- package: math/big
symbols:
- Rat.SetString
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Panic on inputs with large exponents in math/big
description: |-
Rat.SetString and Rat.UnmarshalText may cause a panic or an unrecoverable fatal
error if passed inputs with very large exponents.
published: 2022-02-17T17:33:07Z
cves:
- CVE-2021-33198
credits:
- The OSS-Fuzz project (discovery)
- Emmanuel Odeke (reporter)
references:
- fix: https://go.dev/cl/316149
- fix: https://go.googlesource.com/go/+/6c591f79b0b5327549bd4e94970f7a279efb4ab0
- web: https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI
- report: https://go.dev/issue/45910
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2697.yaml
|
id: GO-2024-2697
modules:
- module: github.com/grafana/grafana
non_go_versions:
- introduced: 9.5.0
- fixed: 9.5.18
- introduced: 10.0.0
- fixed: 10.0.13
- introduced: 10.1.0
- fixed: 10.1.9
- introduced: 10.2.0
- fixed: 10.2.6
- introduced: 10.3.0
- fixed: 10.3.5
vulnerable_at: 5.4.5+incompatible
summary: 'Grafana: Users outside an organization can delete a snapshot with its key in github.com/grafana/grafana'
cves:
- CVE-2024-1313
ghsas:
- GHSA-67rv-qpw2-6qrr
unknown_aliases:
- BIT-grafana-2024-1313
references:
- advisory: https://github.com/grafana/bugbounty/security/advisories/GHSA-67rv-qpw2-6qrr
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-1313
- web: https://grafana.com/security/security-advisories/cve-2024-1313
source:
id: GHSA-67rv-qpw2-6qrr
created: 2024-06-04T15:31:16.41185-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2951.yaml
|
id: GO-2024-2951
modules:
- module: github.com/cometbft/cometbft
versions:
- introduced: 0.37.0
- fixed: 0.37.7
- introduced: 0.38.0
- fixed: 0.38.8
vulnerable_at: 0.38.7
packages:
- package: github.com/cometbft/cometbft/blocksync
symbols:
- NewBlockPool
- BlockPool.removeTimedoutPeers
- BlockPool.RemovePeerAndRedoAllPeerRequests
- BlockPool.SetPeerRange
derived_symbols:
- BlockPool.OnStart
- BlockPool.RedoRequest
- NewReactor
- Reactor.OnStart
- Reactor.Receive
- Reactor.SwitchToBlockSync
summary: |-
Denial of service when syncing with a malicious peer in
github.com/cometbft/cometbft
description: |-
A malicious peer can cause a syncing node to panic during blocksync. The syncing
node may enter into a catastrophic invalid syncing state or get stuck in
blocksync mode, never switching to consensus. Nodes that are vulnerable to this
state may experience a Denial of Service condition in which syncing will not
work as expected when joining a network as a client.
ghsas:
- GHSA-hg58-rf2h-6rr7
credits:
- unknown_feature
references:
- advisory: https://github.com/cometbft/cometbft/security/advisories/GHSA-hg58-rf2h-6rr7
- fix: https://github.com/cometbft/cometbft/commit/07866e11139127e415bd0339ac377b6e6a845533
- fix: https://github.com/cometbft/cometbft/commit/8ba2e4f52d5e626e019501ba6420cc86d5de7857
source:
id: GHSA-hg58-rf2h-6rr7
created: 2024-07-02T10:14:20.718028-07:00
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1268.yaml
|
id: GO-2023-1268
modules:
- module: mellium.im/sasl
versions:
- fixed: 0.3.1
vulnerable_at: 0.3.0
packages:
- package: mellium.im/sasl
symbols:
- NewClient
- NewServer
summary: Authentication failure in mellium.im/sasl
description: |-
An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing
SCRAM-based SASL authentication, if the remote end advertises support for
channel binding, no random nonce is generated (instead, the nonce is empty).
This causes authentication to fail in the best case, but (if paired with a
remote end that does not validate the length of the nonce) could lead to
insufficient randomness being used during authentication.
cves:
- CVE-2022-48195
ghsas:
- GHSA-gvfj-fxx3-j323
references:
- advisory: https://mellium.im/cve/cve-2022-48195/
- fix: https://codeberg.org/mellium/sasl/commit/e6cbf681b247c4efa1477eaad2cc47a01707b732
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2535.yaml
|
id: GO-2024-2535
modules:
- module: github.com/rancher/rancher
non_go_versions:
- introduced: 2.6.0
- fixed: 2.6.14
- introduced: 2.7.0
- fixed: 2.7.10
- introduced: 2.8.0
- fixed: 2.8.2
vulnerable_at: 1.6.30
summary: |-
Rancher permissions on 'namespaces' in any API group grants 'edit' permissions
on namespaces in 'core' in github.com/rancher/rancher
cves:
- CVE-2023-32194
ghsas:
- GHSA-c85r-fwc7-45vc
references:
- advisory: https://github.com/rancher/rancher/security/advisories/GHSA-c85r-fwc7-45vc
source:
id: GHSA-c85r-fwc7-45vc
created: 2024-06-14T11:40:51.774851-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2965.yaml
|
id: GO-2024-2965
modules:
- module: github.com/pomerium/pomerium
versions:
- fixed: 0.26.1
vulnerable_at: 0.26.0
summary: Pomerium exposed OAuth2 access and ID tokens in user info endpoint response in github.com/pomerium/pomerium
cves:
- CVE-2024-39315
references:
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39315
- fix: https://github.com/pomerium/pomerium/commit/4c7c4320afb2ced70ba19b46de1ac4383f3daa48
- web: https://github.com/pomerium/pomerium/security/advisories/GHSA-rrqr-7w59-637v
source:
id: CVE-2024-39315
created: 2024-07-03T11:41:11.749711-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2929.yaml
|
id: GO-2024-2929
modules:
- module: github.com/rancher/rancher
non_go_versions:
- introduced: 2.7.0
- fixed: 2.7.14
- introduced: 2.8.0
- fixed: 2.8.5
vulnerable_at: 1.6.30
summary: Rancher's External RoleTemplates can lead to privilege escalation in github.com/rancher/rancher
cves:
- CVE-2023-32196
ghsas:
- GHSA-64jq-m7rq-768h
references:
- advisory: https://github.com/rancher/rancher/security/advisories/GHSA-64jq-m7rq-768h
source:
id: GHSA-64jq-m7rq-768h
created: 2024-06-27T15:54:17.748688-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0098.yaml
|
id: GO-2021-0098
modules:
- module: github.com/git-lfs/git-lfs
versions:
- fixed: 1.5.1-0.20210113180018-fc664697ed2c
vulnerable_at: 1.5.1-0.20201211195948-e896fc7af7db
packages:
- package: github.com/git-lfs/git-lfs/commands
goos:
- windows
symbols:
- PipeCommand
derived_symbols:
- PipeMediaCommand
- Run
- lockVerifier.Verify
- singleCheckout.Run
- singleCheckout.RunToPath
- uploadContext.NewQueue
- uploadContext.UploadPointers
- package: github.com/git-lfs/git-lfs/creds
goos:
- windows
symbols:
- AskPassCredentialHelper.getFromProgram
- commandCredentialHelper.Approve
derived_symbols:
- AskPassCredentialHelper.Fill
- CredentialHelperWrapper.FillCreds
- CredentialHelpers.Approve
- CredentialHelpers.Fill
- package: github.com/git-lfs/git-lfs/lfs
goos:
- windows
symbols:
- pipeExtensions
derived_symbols:
- GitFilter.Clean
- GitFilter.Smudge
- GitFilter.SmudgeToFile
- package: github.com/git-lfs/git-lfs/lfshttp
goos:
- windows
symbols:
- sshAuthClient.Resolve
derived_symbols:
- Client.Do
- Client.DoWithAccess
- Client.HttpClient
- Client.NewRequest
- Client.Transport
- sshCache.Resolve
summary: Arbitrary code execution on Windows in github.com/git-lfs/git-lfs
description: |-
Due to the standard library behavior of exec.LookPath on Windows a number of
methods may result in arbitrary code execution when cloning or operating on
untrusted Git repositories.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2021-21237
ghsas:
- GHSA-cx3w-xqmc-84g5
credits:
- '@Ry0taK'
references:
- fix: https://github.com/git-lfs/git-lfs/commit/fc664697ed2c2081ee9633010de0a7f9debea72a
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0013.yaml
|
id: GO-2020-0013
modules:
- module: golang.org/x/crypto
versions:
- fixed: 0.0.0-20170330155735-e4e2799dd7aa
vulnerable_at: 0.0.0-20170317163734-459e26527287
packages:
- package: golang.org/x/crypto/ssh
symbols:
- NewClientConn
derived_symbols:
- Dial
summary: Man-in-the-middle attack in golang.org/x/crypto/ssh
description: |-
By default host key verification is disabled which allows for man-in-the-middle
attacks against SSH clients if ClientConfig.HostKeyCallback is not set.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2017-3204
ghsas:
- GHSA-xhjq-w7xm-p8qj
credits:
- Phil Pennock
references:
- fix: https://go.dev/cl/38701
- fix: https://go.googlesource.com/crypto/+/e4e2799dd7aab89f583e1d898300d96367750991
- report: https://go.dev/issue/19767
- web: https://bridge.grumpy-troll.org/2017/04/golang-ssh-security/
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0159.yaml
|
id: GO-2021-0159
modules:
- module: std
versions:
- fixed: 1.4.3
vulnerable_at: 1.4.2
packages:
- package: net/http
symbols:
- CanonicalMIMEHeaderKey
- body.readLocked
- canonicalMIMEHeaderKey
- chunkWriter.writeHeader
- fixLength
- fixTransferEncoding
- readTransfer
- transferWriter.shouldSendContentLength
- validHeaderFieldByte
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Request smuggling due to improper header parsing in net/http
description: |-
HTTP headers were not properly parsed, which allows remote attackers to conduct
HTTP request smuggling attacks via a request that contains Content-Length and
Transfer-Encoding header fields.
published: 2022-01-05T21:39:14Z
cves:
- CVE-2015-5739
- CVE-2015-5740
- CVE-2015-5741
credits:
- Jed Denlea
- Régis Leroy
references:
- fix: https://go.dev/cl/13148
- fix: https://go.googlesource.com/go/+/26049f6f9171d1190f3bbe05ec304845cfe6399f
- fix: https://go.dev/cl/11772
- fix: https://go.dev/cl/11810
- fix: https://go.dev/cl/12865
- fix: https://go.googlesource.com/go/+/117ddcb83d7f42d6aa72241240af99ded81118e9
- fix: https://go.googlesource.com/go/+/300d9a21583e7cf0149a778a0611e76ff7c6680f
- fix: https://go.googlesource.com/go/+/c2db5f4ccc61ba7df96a747e268a277b802cbb87
- report: https://go.dev/issue/12027
- report: https://go.dev/issue/11930
- web: https://groups.google.com/g/golang-announce/c/iSIyW4lM4hY/m/ADuQR4DiDwAJ
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0088.yaml
|
id: GO-2021-0088
modules:
- module: github.com/facebook/fbthrift
versions:
- fixed: 0.31.1-0.20190225164308-c461c1bd1a3e
vulnerable_at: 0.31.1-0.20190225124004-41af43a0444b
packages:
- package: github.com/facebook/fbthrift/thrift/lib/go/thrift
symbols:
- Skip
derived_symbols:
- BinaryProtocol.Skip
- CompactProtocol.Skip
- HeaderProtocol.Skip
- JSONProtocol.Skip
- Process
- ProcessContext
- SimpleJSONProtocol.Skip
- SimpleServer.AcceptLoop
- SimpleServer.AcceptLoopContext
- SimpleServer.Serve
- SimpleServer.ServeContext
- SkipDefaultDepth
- applicationException.Read
summary: Denial of service via ignored unknown fields in github.com/facebook/fbthrift
description: |-
Skip ignores unknown fields, rather than failing. A malicious user can craft
small messages with unknown fields which can take significant resources to
parse. If a server accepts messages from an untrusted user, it may be used as a
denial of service vector.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2019-3564
ghsas:
- GHSA-x4rg-4545-4w7w
references:
- fix: https://github.com/facebook/fbthrift/commit/c461c1bd1a3e130b181aa9c854da3030cd4b5156
- web: https://www.facebook.com/security/advisories/cve-2019-3564
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1941.yaml
|
id: GO-2023-1941
modules:
- module: github.com/elazarl/goproxy
versions:
- fixed: 0.0.0-20230731152917-f99041a5c027
vulnerable_at: 0.0.0-20221015165544-a0805db90819
packages:
- package: github.com/elazarl/goproxy
symbols:
- ProxyHttpServer.handleHttps
derived_symbols:
- ProxyHttpServer.ServeHTTP
summary: Panic when handling invalid request in MITM mode in github.com/elazarl/goproxy
description: An invalid request can cause a panic when running in MITM mode.
cves:
- CVE-2023-37788
ghsas:
- GHSA-4r8x-2p26-976p
references:
- report: https://github.com/elazarl/goproxy/issues/502
- fix: https://github.com/elazarl/goproxy/pull/507
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1098.yaml
|
id: GO-2022-1098
modules:
- module: github.com/btcsuite/btcd
versions:
- fixed: 0.23.2
vulnerable_at: 0.23.1
packages:
- package: github.com/btcsuite/btcd/wire
symbols:
- MsgTx.BtcDecode
derived_symbols:
- MsgBlock.BtcDecode
- MsgBlock.Deserialize
- MsgBlock.DeserializeNoWitness
- MsgBlock.DeserializeTxLoc
- MsgTx.Deserialize
- MsgTx.DeserializeNoWitness
- ReadMessage
- ReadMessageN
- ReadMessageWithEncodingN
summary: Denial of service in message decoding in github.com/btcsuite/btcd
description: |-
Erroneous message decoding can cause denial of service.
Improper checking of maximum witness size during node message decoding prevented
nodes in Lightning Labs lnd (before 0.15.2-beta) to sync.
cves:
- CVE-2022-44797
ghsas:
- GHSA-2chg-86hq-7w38
credits:
- rsafier (Github user)
- Roasbeef (Github user)
references:
- advisory: https://github.com/advisories/GHSA-2chg-86hq-7w38
- report: https://github.com/lightningnetwork/lnd/issues/7002
- fix: https://github.com/btcsuite/btcd/pull/1896/commits/f523d4ccaa5f34a2f761f16a05f5d6e6665b1168
- web: https://github.com/btcsuite/btcd/releases/tag/v0.23.2
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0061.yaml
|
id: GO-2021-0061
modules:
- module: gopkg.in/yaml.v2
versions:
- fixed: 2.2.3
vulnerable_at: 2.2.2
packages:
- package: gopkg.in/yaml.v2
symbols:
- decoder.unmarshal
derived_symbols:
- Decoder.Decode
- Unmarshal
- UnmarshalStrict
- module: github.com/go-yaml/yaml
vulnerable_at: 2.1.0+incompatible
packages:
- package: github.com/go-yaml/yaml
symbols:
- decoder.unmarshal
derived_symbols:
- Decoder.Decode
- Unmarshal
- UnmarshalStrict
summary: Denial of service in gopkg.in/yaml.v2
description: |-
Due to unbounded alias chasing, a maliciously crafted YAML file can cause the
system to consume significant system resources. If parsing user input, this may
be used as a denial of service vector.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-r88r-gmrh-7j83
credits:
- '@simonferquel'
references:
- fix: https://github.com/go-yaml/yaml/pull/375
- fix: https://github.com/go-yaml/yaml/commit/bb4e33bf68bf89cad44d386192cbed201f35b241
cve_metadata:
id: CVE-2021-4235
cwe: 'CWE 400: Uncontrolled Resource Consumption'
references:
- https://lists.debian.org/debian-lts-announce/2023/07/msg00001.html
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2463.yaml
|
id: GO-2024-2463
modules:
- module: github.com/0xJacky/Nginx-UI
versions:
- fixed: 1.9.10-0.20231219195202-ec93ab05a3ec
vulnerable_at: 1.9.10-0.20231219184941-827e76c46e63
packages:
- package: github.com/0xJacky/Nginx-UI/api/cosy
symbols:
- Ctx.SortOrder
- package: github.com/0xJacky/Nginx-UI/model
symbols:
- OrderAndPaginate
summary: SQL injection in github.com/0xJacky/Nginx-UI
cves:
- CVE-2024-22196
ghsas:
- GHSA-h374-mm57-879c
credits:
- '@jorgectf'
references:
- advisory: https://github.com/advisories/GHSA-h374-mm57-879c
- fix: https://github.com/0xJacky/nginx-ui/commit/ec93ab05a3ecbb6bcf464d9dca48d74452df8a5b
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2851.yaml
|
id: GO-2024-2851
modules:
- module: github.com/grafana/grafana
non_go_versions:
- introduced: 7.0.0
- fixed: 8.5.14
- introduced: 9.0.0
- fixed: 9.1.8
vulnerable_at: 5.4.5+incompatible
summary: |-
Grafana Data source and plugin proxy endpoints leaking authentication tokens to
some destination plugins in github.com/grafana/grafana
cves:
- CVE-2022-31130
ghsas:
- GHSA-jv32-5578-pxjc
unknown_aliases:
- BIT-grafana-2022-31130
references:
- advisory: https://github.com/grafana/grafana/security/advisories/GHSA-jv32-5578-pxjc
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2022-31130
- fix: https://github.com/grafana/grafana/commit/4dd56e4dabce10007bf4ba1059bf54178c35b177
- fix: https://github.com/grafana/grafana/commit/9da278c044ba605eb5a1886c48df9a2cb0d3885f
- web: https://github.com/grafana/grafana/releases/tag/v9.1.8
source:
id: GHSA-jv32-5578-pxjc
created: 2024-06-04T14:27:17.106354-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0087.yaml
|
id: GO-2021-0087
modules:
- module: github.com/opencontainers/runc
versions:
- fixed: 1.0.0-rc9.0.20200122160610-2fc03cc11c77
vulnerable_at: 1.0.0-rc9.0.20191217094952-7496a9682535
packages:
- package: github.com/opencontainers/runc/libcontainer
symbols:
- mountToRootfs
skip_fix: 'TODO: Revisit this reason. (Fix causes multiple errors (dependent fields/methods undefined)'
summary: Race condition in github.com/opencontainers/runc
description: |-
A race while mounting volumes allows a possible symlink-exchange attack,
allowing a user whom can start multiple containers with custom volume mount
configurations to escape the container.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2019-19921
ghsas:
- GHSA-fh74-hm69-rqjw
credits:
- Leopold Schabel
references:
- fix: https://github.com/opencontainers/runc/pull/2207
- fix: https://github.com/opencontainers/runc/commit/2fc03cc11c775b7a8b2e48d7ee447cb9bef32ad0
- web: https://github.com/opencontainers/runc/issues/2197
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2560.yaml
|
id: GO-2024-2560
modules:
- module: github.com/greenpau/caddy-security
unsupported_versions:
- last_affected: 1.1.23
vulnerable_at: 1.1.29
summary: Open Redirect in github.com/greenpau/caddy-security
cves:
- CVE-2024-21497
ghsas:
- GHSA-8hp3-rmr7-xh88
references:
- advisory: https://github.com/advisories/GHSA-8hp3-rmr7-xh88
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21497
- report: https://github.com/greenpau/caddy-security/issues/268
- web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy
- web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249861
source:
id: GHSA-8hp3-rmr7-xh88
created: 2024-06-14T11:41:57.639653-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2904.yaml
|
id: GO-2024-2904
modules:
- module: github.com/evmos/evmos
vulnerable_at: 1.1.3
- module: github.com/evmos/evmos/v2
vulnerable_at: 2.0.2
- module: github.com/evmos/evmos/v3
vulnerable_at: 3.0.3
- module: github.com/evmos/evmos/v4
vulnerable_at: 4.0.2
- module: github.com/evmos/evmos/v5
vulnerable_at: 5.0.1
- module: github.com/evmos/evmos/v6
unsupported_versions:
- last_affected: 6.0.4
vulnerable_at: 6.0.4
- module: github.com/evmos/evmos/v7
unsupported_versions:
- last_affected: 7.0.0
vulnerable_at: 7.0.0
- module: github.com/evmos/evmos/v8
unsupported_versions:
- last_affected: 8.2.3
vulnerable_at: 8.2.3
- module: github.com/evmos/evmos/v9
unsupported_versions:
- last_affected: 9.1.0
vulnerable_at: 9.1.0
- module: github.com/evmos/evmos/v10
unsupported_versions:
- last_affected: 10.0.1
vulnerable_at: 10.0.1
- module: github.com/evmos/evmos/v11
unsupported_versions:
- last_affected: 11.0.2
vulnerable_at: 11.0.2
- module: github.com/evmos/evmos/v12
unsupported_versions:
- last_affected: 12.1.6
vulnerable_at: 12.1.6
- module: github.com/evmos/evmos/v13
unsupported_versions:
- last_affected: 13.0.2
vulnerable_at: 13.0.2
- module: github.com/evmos/evmos/v14
unsupported_versions:
- last_affected: 14.1.0
vulnerable_at: 14.1.0
- module: github.com/evmos/evmos/v15
unsupported_versions:
- last_affected: 15.0.0
vulnerable_at: 15.0.0
- module: github.com/evmos/evmos/v16
unsupported_versions:
- last_affected: 16.0.4
vulnerable_at: 16.0.4
- module: github.com/evmos/evmos/v17
unsupported_versions:
- last_affected: 17.0.1
vulnerable_at: 17.0.1
- module: github.com/evmos/evmos/v18
unsupported_versions:
- last_affected: 18.1.0
vulnerable_at: 18.1.0
summary: Evmos allows unvested token delegations in github.com/evmos/evmos
cves:
- CVE-2024-37154
ghsas:
- GHSA-7hrh-v6wp-53vw
references:
- advisory: https://github.com/evmos/evmos/security/advisories/GHSA-7hrh-v6wp-53vw
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-37154
source:
id: GHSA-7hrh-v6wp-53vw
created: 2024-06-26T14:09:01.722367-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1569.yaml
|
id: GO-2023-1569
modules:
- module: std
versions:
- fixed: 1.19.6
- introduced: 1.20.0-0
- fixed: 1.20.1
vulnerable_at: 1.20.0
packages:
- package: mime/multipart
symbols:
- Reader.ReadForm
summary: Excessive resource consumption in mime/multipart
description: |-
A denial of service is possible from excessive resource consumption in net/http
and mime/multipart.
Multipart form parsing with mime/multipart.Reader.ReadForm can consume largely
unlimited amounts of memory and disk files. This also affects form parsing in
the net/http package with the Request methods FormFile, FormValue,
ParseMultipartForm, and PostFormValue.
ReadForm takes a maxMemory parameter, and is documented as storing "up to
maxMemory bytes +10MB (reserved for non-file parts) in memory". File parts which
cannot be stored in memory are stored on disk in temporary files. The
unconfigurable 10MB reserved for non-file parts is excessively large and can
potentially open a denial of service vector on its own. However, ReadForm did
not properly account for all memory consumed by a parsed form, such as map entry
overhead, part names, and MIME headers, permitting a maliciously crafted form to
consume well over 10MB. In addition, ReadForm contained no limit on the number
of disk files created, permitting a relatively small request body to create a
large number of disk temporary files.
With fix, ReadForm now properly accounts for various forms of memory overhead,
and should now stay within its documented limit of 10MB + maxMemory bytes of
memory consumption. Users should still be aware that this limit is high and may
still be hazardous.
In addition, ReadForm now creates at most one on-disk temporary file, combining
multiple form parts into a single temporary file. The mime/multipart.File
interface type's documentation states, "If stored on disk, the File's underlying
concrete type will be an *os.File.". This is no longer the case when a form
contains more than one file part, due to this coalescing of parts into a single
file. The previous behavior of using distinct files for each form part may be
reenabled with the environment variable GODEBUG=multipartfiles=distinct.
Users should be aware that multipart.ReadForm and the http.Request methods that
call it do not limit the amount of disk consumed by temporary files. Callers can
limit the size of form data with http.MaxBytesReader.
credits:
- Arpad Ryszka
- Jakob Ackermann (@das7pad)
references:
- report: https://go.dev/issue/58006
- fix: https://go.dev/cl/468124
- web: https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
cve_metadata:
id: CVE-2022-41725
cwe: 'CWE-400: Uncontrolled Resource Consumption'
references:
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0240.yaml
|
id: GO-2021-0240
modules:
- module: std
versions:
- fixed: 1.15.13
- introduced: 1.16.0-0
- fixed: 1.16.5
vulnerable_at: 1.16.4
packages:
- package: archive/zip
symbols:
- Reader.init
skip_fix: 'TODO: revisit this reason (fix appears to not work with Go <1.18)'
summary: Panic when reading certain archives in archive/zip
description: |-
NewReader and OpenReader can cause a panic or an unrecoverable fatal error when
reading an archive that claims to contain a large number of files, regardless of
its actual size.
published: 2022-02-17T17:33:25Z
cves:
- CVE-2021-33196
credits:
- OSS-Fuzz (discovery)
- Emmanuel Odeke (reporter)
references:
- fix: https://go.dev/cl/318909
- fix: https://go.googlesource.com/go/+/74242baa4136c7a9132a8ccd9881354442788c8c
- web: https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI
- report: https://go.dev/issue/46242
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1180.yaml
|
id: GO-2022-1180
modules:
- module: github.com/kyverno/kyverno
versions:
- introduced: 1.8.3
- fixed: 1.8.5
vulnerable_at: 1.8.5-0.20221217180442-ef63302dc479
packages:
- package: github.com/kyverno/kyverno/pkg/engine
symbols:
- imageVerifier.verifyAttestation
- imageVerifier.verifyAttestations
- imageVerifier.verifyAttestors
- imageVerifier.verifyAttestorSet
- imageVerifier.verifyImage
skip_fix: 'TODO: revisit this reason (undefined: gojmespath.NotFoundError)'
summary: Verification rule bypass in github.com/kyverno/kyverno
description: A malicious proxy/registry can bypass verifyImages rules.
cves:
- CVE-2022-47633
ghsas:
- GHSA-m3cq-xcx9-3gvm
credits:
- '@slashben'
references:
- advisory: https://github.com/kyverno/kyverno/security/advisories/GHSA-m3cq-xcx9-3gvm
- fix: https://github.com/kyverno/kyverno/pull/5713
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0108.yaml
|
id: GO-2021-0108
modules:
- module: github.com/gofiber/fiber
versions:
- fixed: 1.12.6
vulnerable_at: 1.12.5
packages:
- package: github.com/gofiber/fiber
symbols:
- Ctx.Attachment
summary: CRLF vulnerability in Fiber in github.com/gofiber/fiber
description: |-
Due to improper input sanitization, a maliciously constructed filename could
cause a file download to use an attacker controlled filename, as well as
injecting additional headers into an HTTP response.
published: 2021-07-28T18:08:05Z
cves:
- CVE-2020-15111
ghsas:
- GHSA-9cx9-x2gp-9qvh
credits:
- Hasibul Hasan
- Abdullah Shaleh
references:
- fix: https://github.com/gofiber/fiber/pull/579
- fix: https://github.com/gofiber/fiber/commit/f698b5d5066cfe594102ae252cd58a1fe57cf56f
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2023-1571.yaml
|
id: GO-2023-1571
modules:
- module: std
versions:
- fixed: 1.19.6
- introduced: 1.20.0-0
- fixed: 1.20.1
vulnerable_at: 1.20.0
packages:
- package: net/http
symbols:
- Transport.RoundTrip
- Server.Serve
derived_symbols:
- Client.Do
- Client.Get
- Client.Head
- Client.Post
- Client.PostForm
- Get
- Head
- ListenAndServe
- ListenAndServeTLS
- Post
- PostForm
- Serve
- ServeTLS
- Server.ListenAndServe
- Server.ListenAndServeTLS
- Server.ServeTLS
- module: golang.org/x/net
versions:
- fixed: 0.7.0
vulnerable_at: 0.6.1-0.20230213185550-547e7edf3873
packages:
- package: golang.org/x/net/http2
symbols:
- Transport.RoundTrip
- Server.ServeConn
derived_symbols:
- ClientConn.Close
- ClientConn.Ping
- ClientConn.RoundTrip
- ClientConn.Shutdown
- ConfigureServer
- ConfigureTransport
- ConfigureTransports
- ConnectionError.Error
- ErrCode.String
- FrameHeader.String
- FrameType.String
- FrameWriteRequest.String
- Framer.ReadFrame
- Framer.WriteContinuation
- Framer.WriteData
- Framer.WriteDataPadded
- Framer.WriteGoAway
- Framer.WriteHeaders
- Framer.WritePing
- Framer.WritePriority
- Framer.WritePushPromise
- Framer.WriteRSTStream
- Framer.WriteRawFrame
- Framer.WriteSettings
- Framer.WriteSettingsAck
- Framer.WriteWindowUpdate
- GoAwayError.Error
- ReadFrameHeader
- Setting.String
- SettingID.String
- SettingsFrame.ForeachSetting
- StreamError.Error
- Transport.CloseIdleConnections
- Transport.NewClientConn
- Transport.RoundTripOpt
- bufferedWriter.Flush
- bufferedWriter.Write
- chunkWriter.Write
- clientConnPool.GetClientConn
- connError.Error
- dataBuffer.Read
- duplicatePseudoHeaderError.Error
- gzipReader.Close
- gzipReader.Read
- headerFieldNameError.Error
- headerFieldValueError.Error
- noDialClientConnPool.GetClientConn
- noDialH2RoundTripper.RoundTrip
- pipe.Read
- priorityWriteScheduler.CloseStream
- priorityWriteScheduler.OpenStream
- pseudoHeaderError.Error
- requestBody.Close
- requestBody.Read
- responseWriter.Flush
- responseWriter.FlushError
- responseWriter.Push
- responseWriter.SetReadDeadline
- responseWriter.SetWriteDeadline
- responseWriter.Write
- responseWriter.WriteHeader
- responseWriter.WriteString
- serverConn.CloseConn
- serverConn.Flush
- stickyErrWriter.Write
- transportResponseBody.Close
- transportResponseBody.Read
- writeData.String
- package: golang.org/x/net/http2/hpack
symbols:
- Decoder.parseFieldLiteral
- Decoder.readString
derived_symbols:
- Decoder.DecodeFull
- Decoder.Write
summary: Denial of service via crafted HTTP/2 stream in net/http and golang.org/x/net
description: |-
A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the
HPACK decoder, sufficient to cause a denial of service from a small number of
small requests.
ghsas:
- GHSA-vvpx-j8f3-3w6h
credits:
- Philippe Antoine (Catena cyber)
references:
- report: https://go.dev/issue/57855
- fix: https://go.dev/cl/468135
- fix: https://go.dev/cl/468295
- web: https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
cve_metadata:
id: CVE-2022-41723
cwe: 'CWE 400: Uncontrolled Resource Consumption'
references:
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MA5XS5DAOJ5PKKNG5TUXKPQOFHT5VBC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLBQ3A7ROLEQXQLXFDLNJ7MYPKG5GULE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGW7GE2Z32ZT47UFAQFDRQE33B7Q7LMT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XX3IMUTZKRQ73PBZM4E2JP4BKYH4C6XE/
- https://www.couchbase.com/alerts/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BUK2ZIAGCULOOYDNH25JPU6JBES5NF2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7N5GV4CHH6WAGX3GFMDD3COEOVCZ4RI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/REMHVVIBDNKSRKNOTV7EQSB7CYQWOUOU/
- https://security.gentoo.org/glsa/202311-09
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2563.yaml
|
id: GO-2024-2563
modules:
- module: github.com/greenpau/caddy-security
unsupported_versions:
- last_affected: 1.1.23
vulnerable_at: 1.1.29
summary: |-
Improper Restriction of Excessive Authentication Attempts in
github.com/greenpau/caddy-security
cves:
- CVE-2024-21500
ghsas:
- GHSA-vfph-hjfv-cpv2
references:
- advisory: https://github.com/advisories/GHSA-vfph-hjfv-cpv2
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21500
- report: https://github.com/greenpau/caddy-security/issues/271
- web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy
- web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249864
source:
id: GHSA-vfph-hjfv-cpv2
created: 2024-06-14T11:42:12.085045-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2430.yaml
|
id: GO-2024-2430
modules:
- module: github.com/cubefs/cubefs
non_go_versions:
- fixed: 3.3.1
vulnerable_at: 2.5.2+incompatible
summary: |-
Authenticated users can crash the CubeFS servers with maliciously crafted
requests in github.com/cubefs/cubefs
cves:
- CVE-2023-46738
ghsas:
- GHSA-qc6v-g3xw-grmx
references:
- advisory: https://github.com/cubefs/cubefs/security/advisories/GHSA-qc6v-g3xw-grmx
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-46738
- fix: https://github.com/cubefs/cubefs/commit/dd46c24873c8f3df48d0a598b704ef9bd24b1ec1
source:
id: GHSA-qc6v-g3xw-grmx
created: 2024-06-14T11:34:31.298261-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-1166.yaml
|
id: GO-2022-1166
modules:
- module: helm.sh/helm/v3
versions:
- fixed: 3.10.3
vulnerable_at: 3.10.2
packages:
- package: helm.sh/helm/v3/pkg/chartutil
symbols:
- ValidateAgainstSingleSchema
derived_symbols:
- ToRenderValues
- ValidateAgainstSchema
summary: Denial of service via schema file in helm.sh/helm/v3
description: |-
Certain JSON schema validation files can cause a Helm Client to panic, leading
to a possible denial of service.
The chartutil package contains a parser that loads a JSON Schema validation
file. For example, the Helm client when rendering a chart will validate its
values with the schema file. The chartutil package parses the schema file and
loads it into memory, but some schema files can cause array data structures to
be created causing a memory violation.
The Helm Client will panic with a schema file that causes a memory violation
panic. Helm is not a long running service so the panic will not affect future
uses of the Helm client.
cves:
- CVE-2022-23526
ghsas:
- GHSA-67fx-wx78-jx33
credits:
- Ada Logics, in a fuzzing audit sponsored by CNCF
references:
- advisory: https://github.com/helm/helm/security/advisories/GHSA-67fx-wx78-jx33
- fix: https://github.com/helm/helm/commit/bafafa8bb1b571b61d7a9528da8d40c307dade3d
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2683.yaml
|
id: GO-2024-2683
modules:
- module: github.com/hashicorp/consul
versions:
- introduced: 1.8.1
- fixed: 1.11.9
- introduced: 1.12.0
- fixed: 1.12.5
- introduced: 1.13.0
- fixed: 1.13.2
vulnerable_at: 1.13.1
packages:
- package: github.com/hashicorp/consul/agent/consul
symbols:
- jwtAuthorizer.Authorize
derived_symbols:
- AutoConfig.InitialConfiguration
summary: |-
Improper handling of node names in JWT claims assertions in
github.com/hashicorp/consul
description: |-
HashiCorp Consul does not properly validate the node or segment names prior to
interpolation and usage in JWT claim assertions with the auto config RPC.
cves:
- CVE-2021-41803
ghsas:
- GHSA-hr3v-8cp3-68rf
unknown_aliases:
- BIT-consul-2021-41803
credits:
- anonymous4ACL24
references:
- web: https://discuss.hashicorp.com/t/hcsec-2022-19-consul-auto-config-jwt-authorization-missing-input-validation/44627
- fix: https://github.com/hashicorp/consul/pull/14577/commits/2c881259ce10e308ff03afc968c4165998fd7fee
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2943.yaml
|
id: GO-2024-2943
modules:
- module: github.com/lightningnetwork/lnd
versions:
- fixed: 0.17.0-beta
vulnerable_at: 0.16.4-beta.rc1
summary: |-
Lightning Network Daemon (LND)'s onion processing logic leads to a denial of
service in github.com/lightningnetwork/lnd
cves:
- CVE-2024-38359
ghsas:
- GHSA-9gxx-58q6-42p7
references:
- advisory: https://github.com/lightningnetwork/lnd/security/advisories/GHSA-9gxx-58q6-42p7
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-38359
- web: https://delvingbitcoin.org/t/dos-disclosure-lnd-onion-bomb/979
- web: https://github.com/lightningnetwork/lnd/releases/tag/v0.17.0-beta
- web: https://lightning.network
- web: https://morehouse.github.io/lightning/lnd-onion-bomb
source:
id: GHSA-9gxx-58q6-42p7
created: 2024-07-01T14:09:09.810773-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2973.yaml
|
id: GO-2024-2973
modules:
- module: github.com/traefik/traefik
vulnerable_at: 1.7.34
- module: github.com/traefik/traefik/v2
versions:
- fixed: 2.11.6
vulnerable_at: 2.11.5
- module: github.com/traefik/traefik/v3
versions:
- introduced: 3.0.0-beta3
- fixed: 3.0.4
- introduced: 3.1.0-rc1
- fixed: 3.1.0-rc3
vulnerable_at: 3.1.0-rc2
summary: |-
Bypassing IP allow-lists in traefik via HTTP/3 early data requests in QUIC 0-RTT
handshakes in github.com/traefik/traefik
cves:
- CVE-2024-39321
ghsas:
- GHSA-gxrv-wf35-62w9
references:
- advisory: https://github.com/traefik/traefik/security/advisories/GHSA-gxrv-wf35-62w9
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-39321
- web: https://github.com/traefik/traefik/releases/tag/v2.11.6
- web: https://github.com/traefik/traefik/releases/tag/v3.0.4
- web: https://github.com/traefik/traefik/releases/tag/v3.1.0-rc3
source:
id: GHSA-gxrv-wf35-62w9
created: 2024-07-08T13:23:57.045256-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2549.yaml
|
id: GO-2024-2549
modules:
- module: github.com/greenpau/caddy-security
unsupported_versions:
- last_affected: 1.1.20
vulnerable_at: 1.1.29
summary: caddy-security plugin for Caddy vulnerable to reflected Cross-site Scripting in github.com/greenpau/caddy-security
cves:
- CVE-2023-52430
ghsas:
- GHSA-xwmv-cx7p-fqfc
references:
- advisory: https://github.com/advisories/GHSA-xwmv-cx7p-fqfc
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2023-52430
- report: https://github.com/greenpau/caddy-security/issues/264
- web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy
source:
id: GHSA-xwmv-cx7p-fqfc
created: 2024-06-14T11:41:20.789976-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0272.yaml
|
id: GO-2022-0272
modules:
- module: github.com/kataras/iris/v12
versions:
- fixed: 12.2.0-alpha8
vulnerable_at: 12.1.8
packages:
- package: github.com/kataras/iris/v12/context
symbols:
- Context.UploadFormFiles
- module: github.com/kataras/iris
vulnerable_at: 0.0.2
packages:
- package: github.com/kataras/iris/context
symbols:
- Context.UploadFormFiles
summary: Directory traversal in github.com/kataras/iris and github.com/kataras/iris/v12
description: |-
The Context.UploadFormFiles function is vulnerable to directory traversal
attacks, and can be made to write to arbitrary locations outside the destination
directory.
This vulnerability only occurs when built with Go versions prior to 1.17. Go
1.17 and later strip directory paths from filenames returned by
"mime/multipart".Part.FileName, which avoids this issue.
published: 2022-07-15T23:08:12Z
cves:
- CVE-2021-23772
ghsas:
- GHSA-jcxc-rh6w-wf49
credits:
- Snyk Security Team
references:
- fix: https://github.com/kataras/iris/commit/e213dba0d32ff66653e0ef124bc5088817264b08
- web: https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRIS-2325169
- web: https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRISV12-2325170
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2850.yaml
|
id: GO-2024-2850
modules:
- module: github.com/nats-io/nats-server
vulnerable_at: 1.4.1
- module: github.com/nats-io/nats-server/v2
versions:
- fixed: 2.2.3
vulnerable_at: 2.2.2
summary: NATS server TLS missing ciphersuite settings when CLI flags used in github.com/nats-io/nats-server
cves:
- CVE-2021-32026
ghsas:
- GHSA-jj54-5q2m-q7pj
references:
- advisory: https://github.com/nats-io/nats-server/security/advisories/GHSA-jj54-5q2m-q7pj
- fix: https://github.com/nats-io/nats-server/commit/ffccc2e1bd7aa2466bd9e631e976bfd7ca46f225
- web: https://advisories.nats.io
- web: https://advisories.nats.io/CVE/CVE-2021-32026.txt
source:
id: GHSA-jj54-5q2m-q7pj
created: 2024-06-26T14:06:56.187996-04:00
review_status: UNREVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2517.yaml
|
id: GO-2024-2517
modules:
- module: github.com/grafana/grafana
non_go_versions:
- fixed: 6.7.3
vulnerable_at: 5.4.5+incompatible
summary: Grafana XSS in header column rename in github.com/grafana/grafana
cves:
- CVE-2020-12245
ghsas:
- GHSA-ccmg-w4xm-p28v
unknown_aliases:
- BIT-grafana-2020-12245
references:
- advisory: https://github.com/advisories/GHSA-ccmg-w4xm-p28v
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-12245
- fix: https://github.com/grafana/grafana/commit/0284747c88eb9435899006d26ffaf65f89dec88e
- fix: https://github.com/grafana/grafana/pull/23816
- web: http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00060.html
- web: http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html
- web: http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00009.html
- web: http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00017.html
- web: https://community.grafana.com/t/release-notes-v6-7-x/27119
- web: https://github.com/grafana/grafana/blob/master/CHANGELOG.md#673-2020-04-23
- web: https://security.netapp.com/advisory/ntap-20200511-0001
source:
id: GHSA-ccmg-w4xm-p28v
created: 2024-06-14T11:39:42.736913-04:00
review_status: UNREVIEWED
unexcluded: NOT_IMPORTABLE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2024-2558.yaml
|
id: GO-2024-2558
modules:
- module: github.com/greenpau/caddy-security
unsupported_versions:
- last_affected: 1.1.23
vulnerable_at: 1.1.29
summary: Authentication Bypass by Spoofing in github.com/greenpau/caddy-security
cves:
- CVE-2024-21494
ghsas:
- GHSA-vj36-3ccr-6563
references:
- advisory: https://github.com/advisories/GHSA-vj36-3ccr-6563
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-21494
- report: https://github.com/greenpau/caddy-security/issues/266
- web: https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy
- web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249859
source:
id: GHSA-vj36-3ccr-6563
created: 2024-06-14T11:41:47.937414-04:00
review_status: UNREVIEWED
unexcluded: EFFECTIVELY_PRIVATE
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0564.yaml
|
id: GO-2022-0564
modules:
- module: github.com/biscuit-auth/biscuit-go
vulnerable_at: 1.0.0
packages:
- package: github.com/biscuit-auth/biscuit-go
summary: Signature forgery in github.com/biscuit-auth/biscuit-go
description: |-
An attacker can forge Biscuit v1 tokens with any access level.
There is no known workaround for Biscuit v1. The Biscuit v2 specification avoids
this vulnerability.
published: 2022-08-15T18:02:15Z
cves:
- CVE-2022-31053
ghsas:
- GHSA-75rw-34q6-72cr
references:
- advisory: https://github.com/advisories/GHSA-75rw-34q6-72cr
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2020-0032.yaml
|
id: GO-2020-0032
modules:
- module: github.com/goadesign/goa
versions:
- fixed: 1.4.3
vulnerable_at: 1.4.3-0.20191129212618-4f2e80285f2e
packages:
- package: github.com/goadesign/goa
symbols:
- Controller.FileHandler
derived_symbols:
- Service.ListenAndServe
- Service.ListenAndServeTLS
- Service.Serve
- mux.ServeHTTP
- module: goa.design/goa
versions:
- fixed: 1.4.3
vulnerable_at: 1.4.3-0.20191129212618-4f2e80285f2e
packages:
- package: goa.design/goa
symbols:
- Controller.FileHandler
skip_fix: 'TODO: revisit this reason (cannot find module providing package github.com/goadesign/goa/uuid)'
- module: goa.design/goa/v3
versions:
- fixed: 3.0.9
vulnerable_at: 3.0.8
packages:
- package: goa.design/goa/v3
symbols:
- Controller.FileHandler
skip_fix: 'TODO: revisit this reason (goa.design/goa/v3 appears to not be a package, but I could not locate the fix for this issue in v3)'
summary: Path traversal in github.com/goadesign/goa
description: |-
Due to improper sanitization of user input, Controller.FileHandler allows for
directory traversal, allowing an attacker to read files outside of the target
directory that the server has permission to read.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-fjgq-224f-fq37
credits:
- '@christi3k'
references:
- fix: https://github.com/goadesign/goa/pull/2388
- fix: https://github.com/goadesign/goa/commit/70b5a199d0f813d74423993832c424e1fc73fb39
cve_metadata:
id: CVE-2019-25073
cwe: 'CWE-22: Improper Limitation of a Pathname to a Restricted Directory(''Path Traversal'')'
description: |-
Improper path sanitization in github.com/goadesign/goa before v3.0.9, v2.0.10,
or v1.4.3 allow remote attackers to read files outside of the intended
directory.
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2022-0256.yaml
|
id: GO-2022-0256
modules:
- module: github.com/ethereum/go-ethereum
versions:
- fixed: 1.10.9
vulnerable_at: 1.10.8
packages:
- package: github.com/ethereum/go-ethereum/eth/protocols/snap
symbols:
- handleMessage
- package: github.com/ethereum/go-ethereum/trie
symbols:
- Trie.tryGetNode
derived_symbols:
- SecureTrie.TryGetNode
- Trie.TryGetNode
summary: Panic via maliciously crafted message in github.com/ethereum/go-ethereum
description: A maliciously crafted snap/1 protocol message can cause a panic.
published: 2022-07-15T23:08:03Z
cves:
- CVE-2021-41173
ghsas:
- GHSA-59hh-656j-3p7v
references:
- fix: https://github.com/ethereum/go-ethereum/pull/23657/commits/f1fd963a5a965e643e52fcf805a2a02a323c32b8
review_status: REVIEWED
|
reports
|
/home/linuxreitt/Michinereitt/Tuning/Workshop_Scripts/hf-codegen/data/golang_public_repos/vulndb/data/reports/GO-2021-0096.yaml
|
id: GO-2021-0096
modules:
- module: github.com/proglottis/gpgme
versions:
- fixed: 0.1.1
vulnerable_at: 0.1.1-0.20191030043844-e5586b79c357
packages:
- package: github.com/proglottis/gpgme
summary: Memory corruption or code execution in github.com/proglottis/gpgme
description: |-
Due to improper setting of finalizers, memory passed to C may be freed before it
is used, leading to crashes due to memory corruption or possible code execution.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-8945
ghsas:
- GHSA-m6wg-2mwg-4rfq
credits:
- Ulrich Obergfell
references:
- fix: https://github.com/proglottis/gpgme/pull/23
- fix: https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733
review_status: REVIEWED
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.