data/reports: add 2 unreviewed reports
- data/reports/GO-2025-3371.yaml
- data/reports/GO-2025-3374.yaml
Fixes golang/vulndb#3371
Fixes golang/vulndb#3374
Change-Id: I599258340cc9152f54d07cd92262a32d79c3e84b
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/641495
Reviewed-by: Damien Neil <dneil@google.com>
Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Reviewed-by: Zvonimir Pavlinovic <zpavlinovic@google.com>
diff --git a/data/osv/GO-2025-3371.json b/data/osv/GO-2025-3371.json
new file mode 100644
index 0000000..5651099
--- /dev/null
+++ b/data/osv/GO-2025-3371.json
@@ -0,0 +1,58 @@
+{
+ "schema_version": "1.3.1",
+ "id": "GO-2025-3371",
+ "modified": "0001-01-01T00:00:00Z",
+ "published": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "GHSA-2r2v-9pf8-6342"
+ ],
+ "summary": "WireGuard Portal v2 Vulnerable to OAuth Insecure Redirect URI / Account Takeover in github.com/h44z/wg-portal",
+ "details": "WireGuard Portal v2 Vulnerable to OAuth Insecure Redirect URI / Account Takeover in github.com/h44z/wg-portal.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/h44z/wg-portal from v2.0.0-alpha.1 before v2.0.0-alpha.3.",
+ "affected": [
+ {
+ "package": {
+ "name": "github.com/h44z/wg-portal",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {
+ "custom_ranges": [
+ {
+ "type": "ECOSYSTEM",
+ "events": [
+ {
+ "introduced": "2.0.0-alpha.1"
+ },
+ {
+ "fixed": "2.0.0-alpha.3"
+ }
+ ]
+ }
+ ]
+ }
+ }
+ ],
+ "references": [
+ {
+ "type": "ADVISORY",
+ "url": "https://github.com/h44z/wg-portal/security/advisories/GHSA-2r2v-9pf8-6342"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/h44z/wg-portal/commit/62dbdfe0f96045d46e121d509fc181fbb7936895"
+ }
+ ],
+ "database_specific": {
+ "url": "https://pkg.go.dev/vuln/GO-2025-3371",
+ "review_status": "UNREVIEWED"
+ }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2025-3374.json b/data/osv/GO-2025-3374.json
new file mode 100644
index 0000000..529733a
--- /dev/null
+++ b/data/osv/GO-2025-3374.json
@@ -0,0 +1,52 @@
+{
+ "schema_version": "1.3.1",
+ "id": "GO-2025-3374",
+ "modified": "0001-01-01T00:00:00Z",
+ "published": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "CVE-2025-22130",
+ "GHSA-j4jw-m6xr-fv6c"
+ ],
+ "summary": "Soft Serve vulnerable to path traversal attacks in github.com/charmbracelet/soft-serve",
+ "details": "Soft Serve vulnerable to path traversal attacks in github.com/charmbracelet/soft-serve",
+ "affected": [
+ {
+ "package": {
+ "name": "github.com/charmbracelet/soft-serve",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ },
+ {
+ "fixed": "0.8.2"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ }
+ ],
+ "references": [
+ {
+ "type": "ADVISORY",
+ "url": "https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-j4jw-m6xr-fv6c"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/charmbracelet/soft-serve/commit/a8d1bf3f9349c138383b65079b7b8ad97fff78f4"
+ },
+ {
+ "type": "WEB",
+ "url": "https://github.com/charmbracelet/soft-serve/releases/tag/v0.8.2"
+ }
+ ],
+ "database_specific": {
+ "url": "https://pkg.go.dev/vuln/GO-2025-3374",
+ "review_status": "UNREVIEWED"
+ }
+}
\ No newline at end of file
diff --git a/data/reports/GO-2025-3371.yaml b/data/reports/GO-2025-3371.yaml
new file mode 100644
index 0000000..ec8c981
--- /dev/null
+++ b/data/reports/GO-2025-3371.yaml
@@ -0,0 +1,17 @@
+id: GO-2025-3371
+modules:
+ - module: github.com/h44z/wg-portal
+ non_go_versions:
+ - introduced: 2.0.0-alpha.1
+ - fixed: 2.0.0-alpha.3
+ vulnerable_at: 1.0.19
+summary: WireGuard Portal v2 Vulnerable to OAuth Insecure Redirect URI / Account Takeover in github.com/h44z/wg-portal
+ghsas:
+ - GHSA-2r2v-9pf8-6342
+references:
+ - advisory: https://github.com/h44z/wg-portal/security/advisories/GHSA-2r2v-9pf8-6342
+ - fix: https://github.com/h44z/wg-portal/commit/62dbdfe0f96045d46e121d509fc181fbb7936895
+source:
+ id: GHSA-2r2v-9pf8-6342
+ created: 2025-01-08T08:41:43.731247-10:00
+review_status: UNREVIEWED
diff --git a/data/reports/GO-2025-3374.yaml b/data/reports/GO-2025-3374.yaml
new file mode 100644
index 0000000..84980ec
--- /dev/null
+++ b/data/reports/GO-2025-3374.yaml
@@ -0,0 +1,19 @@
+id: GO-2025-3374
+modules:
+ - module: github.com/charmbracelet/soft-serve
+ versions:
+ - fixed: 0.8.2
+ vulnerable_at: 0.8.1
+summary: Soft Serve vulnerable to path traversal attacks in github.com/charmbracelet/soft-serve
+cves:
+ - CVE-2025-22130
+ghsas:
+ - GHSA-j4jw-m6xr-fv6c
+references:
+ - advisory: https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-j4jw-m6xr-fv6c
+ - fix: https://github.com/charmbracelet/soft-serve/commit/a8d1bf3f9349c138383b65079b7b8ad97fff78f4
+ - web: https://github.com/charmbracelet/soft-serve/releases/tag/v0.8.2
+source:
+ id: GHSA-j4jw-m6xr-fv6c
+ created: 2025-01-08T08:41:22.954732-10:00
+review_status: UNREVIEWED