blob: 5cdf3d18133667ff4ab6c1c92402c292d804e63e [file] [log] [blame]
id: GO-2024-3333
modules:
- module: golang.org/x/net
versions:
- fixed: 0.33.0
vulnerable_at: 0.32.0
packages:
- package: golang.org/x/net/html
symbols:
- parseDoctype
- htmlIntegrationPoint
- inTableIM
- inBodyIM
derived_symbols:
- Parse
- ParseFragment
- ParseFragmentWithOptions
- ParseWithOptions
summary: Non-linear parsing of case-insensitive content in golang.org/x/net/html
description: |-
An attacker can craft an input to the Parse functions that would be processed
non-linearly with respect to its length, resulting in extremely slow parsing.
This could cause a denial of service.
ghsas:
- GHSA-w32m-9786-jp63
credits:
- Guido Vranken
references:
- fix: https://go.dev/cl/637536
- report: https://go.dev/issue/70906
- web: https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ
cve_metadata:
id: CVE-2024-45338
cwe: 'CWE-405: Asymmetric Resource Consumption (Amplification)'
source:
id: go-security-team
created: 2024-12-18T15:03:33.947657-05:00
review_status: REVIEWED