| id: GO-2024-2618 |
| modules: |
| - module: github.com/cloudevents/sdk-go/v2 |
| versions: |
| - fixed: 2.15.2 |
| vulnerable_at: 2.15.1 |
| packages: |
| - package: github.com/cloudevents/sdk-go/v2/protocol/http |
| symbols: |
| - New |
| summary: Authentication token leak in github.com/cloudevents/sdk-go/v2 |
| description: |- |
| Using cloudevents.WithRoundTripper to create a cloudevents.Client with an |
| authenticated http.RoundTripper causes the go-sdk to leak credentials to |
| arbitrary endpoints. When the transport is populated with an authenticated |
| transport, http.DefaultClient is modified with the authenticated transport and |
| will start to send Authorization tokens to any endpoint it is used to contact. |
| cves: |
| - CVE-2024-28110 |
| ghsas: |
| - GHSA-5pf6-2qwx-pxm2 |
| credits: |
| - mattmoor |
| - tcnghia |
| references: |
| - advisory: https://github.com/cloudevents/sdk-go/security/advisories/GHSA-5pf6-2qwx-pxm2 |
| - fix: https://github.com/cloudevents/sdk-go/commit/de2f28370b0d2a0f64f92c0c6139fa4b8a7c3851 |
| - web: https://github.com/cloudevents/sdk-go/blob/67e389964131d55d65cd14b4eb32d57a47312695/v2/protocol/http/protocol.go#L104-L110 |
| review_status: REVIEWED |