| { |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0", |
| "cveMetadata": { |
| "cveId": "CVE-2022-3347" |
| }, |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc" |
| }, |
| "title": "Incorrect DNSSEC validation in github.com/peterzen/goresolver", |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. Root DNSSEC public keys are not validated, permitting an attacker to present a self-signed root key and delegation chain." |
| } |
| ], |
| "affected": [ |
| { |
| "vendor": "github.com/peterzen/goresolver", |
| "product": "github.com/peterzen/goresolver", |
| "collectionURL": "https://pkg.go.dev", |
| "packageName": "github.com/peterzen/goresolver", |
| "defaultStatus": "affected" |
| } |
| ], |
| "problemTypes": [ |
| { |
| "descriptions": [ |
| { |
| "lang": "en", |
| "description": "CWE 295: Improper Certificate Validation" |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://github.com/peterzen/goresolver/issues/5#issuecomment-1150214257" |
| }, |
| { |
| "url": "https://pkg.go.dev/vuln/GO-2022-1026" |
| } |
| ] |
| } |
| } |
| } |