blob: 10cd8fb32f99678db42f3bbd39df40ee72ea376d [file] [log] [blame]
id: GO-2025-3457
modules:
- module: github.com/clidey/whodb/core
versions:
- fixed: 0.0.0-20250127202645-8d67b767e005
summary: |-
WhoDB allows parameter injection in DB connection URIs leading to local file
inclusion in github.com/clidey/whodb/core
cves:
- CVE-2025-24787
ghsas:
- GHSA-c7w4-9wv8-7x7c
references:
- advisory: https://github.com/clidey/whodb/security/advisories/GHSA-c7w4-9wv8-7x7c
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2025-24787
- web: https://github.com/clidey/whodb/commit/8d67b767e00552e5eba2b1537179b74bfa662ee1
- web: https://github.com/go-sql-driver/mysql/blob/7403860363ca112af503b4612568c3096fecb466/infile.go#L128
notes:
- fix: 'github.com/clidey/whodb/core: could not add vulnerable_at: cannot auto-guess when fixed version is 0.0.0 pseudo-version'
source:
id: GHSA-c7w4-9wv8-7x7c
created: 2025-02-07T16:10:01.801889-05:00
review_status: UNREVIEWED