| { |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0", |
| "cveMetadata": { |
| "cveId": "CVE-2021-4236" |
| }, |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc" |
| }, |
| "title": "Panic or authentication bypass in github.com/ecnepsnai/web", |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "Web Sockets do not execute any AuthenticateMethod methods which may be set, leading to a nil pointer dereference if the returned UserData pointer is assumed to be non-nil, or authentication bypass. This issue only affects WebSockets with an AuthenticateMethod hook. Request handlers that do not explicitly use WebSockets are not vulnerable." |
| } |
| ], |
| "affected": [ |
| { |
| "vendor": "github.com/ecnepsnai/web", |
| "product": "github.com/ecnepsnai/web", |
| "collectionURL": "https://pkg.go.dev", |
| "packageName": "github.com/ecnepsnai/web", |
| "versions": [ |
| { |
| "version": "1.4.0", |
| "lessThan": "1.5.2", |
| "status": "affected", |
| "versionType": "semver" |
| } |
| ], |
| "programRoutines": [ |
| { |
| "name": "Server.socketHandler" |
| }, |
| { |
| "name": "Server.Socket" |
| } |
| ], |
| "defaultStatus": "unaffected" |
| } |
| ], |
| "problemTypes": [ |
| { |
| "descriptions": [ |
| { |
| "lang": "en", |
| "description": "CWE-400: Uncontrolled Resource Consumption" |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://github.com/ecnepsnai/web/commit/5a78f8d5c41ce60dcf9f61aaf47a7a8dc3e0002f" |
| }, |
| { |
| "url": "https://pkg.go.dev/vuln/GO-2021-0107" |
| } |
| ] |
| } |
| } |
| } |