blob: d589bc7528e384287304b3bcfab67896d7a913e5 [file] [log] [blame]
id: GO-2024-3108
modules:
- module: github.com/SpectoLabs/hoverfly
versions:
- fixed: 1.10.3
vulnerable_at: 1.10.2
summary: |-
Hoverfly allows an arbitrary file read in the `/api/v2/simulation` endpoint
(`GHSL-2023-274`) in github.com/SpectoLabs/hoverfly
cves:
- CVE-2024-45388
ghsas:
- GHSA-6xx4-x46f-f897
references:
- advisory: https://github.com/SpectoLabs/hoverfly/security/advisories/GHSA-6xx4-x46f-f897
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-45388
- web: https://codeql.github.com/codeql-query-help/go/go-path-injection
- web: https://github.com/SpectoLabs/hoverfly/releases/tag/v1.10.3
- web: https://github.com/spectolabs/hoverfly/blob/15d6ee9ea4e0de67aec5a41c28d21dc147243da0/core/handlers/v2/simulation_handler.go#L87
source:
id: GHSA-6xx4-x46f-f897
created: 2024-09-06T13:02:13.333246-04:00
review_status: UNREVIEWED