blob: 116056b1e1249090de2237e64751079a82d1aa2c [file] [log] [blame]
Copyright 2024 The Go Authors. All rights reserved.
Use of this source code is governed by a BSD-style
license that can be found in the LICENSE file.
Repo in the shape of "https://github.com/CVEProject/cvelistV5".
Updated with real data 2024-09-05T20:00:00-04:00.
Auto-generated; do not edit directly.
-- README.md --
ignore me please
-- cves/2020/9xxx/CVE-2020-9283.json --
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"state": "PUBLISHED",
"cveId": "CVE-2020-9283",
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"dateUpdated": "2024-08-04T10:26:15.873Z",
"dateReserved": "2020-02-19T00:00:00",
"datePublished": "2020-02-20T00:00:00"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2023-06-16T00:00:00"
},
"descriptions": [
{
"lang": "en",
"value": "golang.org/x/crypto before v0.0.0-20200220183623-bac4c82f6975 for Go allows a panic during signature verification in the golang.org/x/crypto/ssh package. A client can attack an SSH server that accepts public keys. Also, a server can attack any SSH client."
}
],
"affected": [
{
"vendor": "n/a",
"product": "n/a",
"versions": [
{
"version": "n/a",
"status": "affected"
}
]
}
],
"references": [
{
"url": "https://groups.google.com/forum/#%21topic/golang-announce/3L45YRc91SY"
},
{
"url": "http://packetstormsecurity.com/files/156480/Go-SSH-0.0.2-Denial-Of-Service.html"
},
{
"name": "[debian-lts-announce] 20201007 [SECURITY] [DLA 2402-1] golang-go.crypto security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00014.html"
},
{
"name": "[debian-lts-announce] 20201116 [SECURITY] [DLA 2453-1] restic security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00027.html"
},
{
"name": "[debian-lts-announce] 20201118 [SECURITY] [DLA 2455-1] packer security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00031.html"
},
{
"name": "[debian-lts-announce] 20230616 [SECURITY] [DLA 3455-1] golang-go.crypto security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00017.html"
}
],
"problemTypes": [
{
"descriptions": [
{
"type": "text",
"lang": "en",
"description": "n/a"
}
]
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE",
"dateUpdated": "2024-08-04T10:26:15.873Z"
},
"title": "CVE Program Container",
"references": [
{
"url": "https://groups.google.com/forum/#%21topic/golang-announce/3L45YRc91SY",
"tags": [
"x_transferred"
]
},
{
"url": "http://packetstormsecurity.com/files/156480/Go-SSH-0.0.2-Denial-Of-Service.html",
"tags": [
"x_transferred"
]
},
{
"name": "[debian-lts-announce] 20201007 [SECURITY] [DLA 2402-1] golang-go.crypto security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/10/msg00014.html"
},
{
"name": "[debian-lts-announce] 20201116 [SECURITY] [DLA 2453-1] restic security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00027.html"
},
{
"name": "[debian-lts-announce] 20201118 [SECURITY] [DLA 2455-1] packer security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00031.html"
},
{
"name": "[debian-lts-announce] 20230616 [SECURITY] [DLA 3455-1] golang-go.crypto security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00017.html"
}
]
}
]
}
}
-- cves/2021/27xxx/CVE-2021-27919.json --
{
"containers": {
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-04T15:11:53",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw"
},
{
"name": "FEDORA-2021-6a3024b3fd",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/"
},
{
"name": "FEDORA-2021-e71b05ba7b",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/"
},
{
"name": "GLSA-202208-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202208-02"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-27919",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw",
"refsource": "MISC",
"url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw"
},
{
"name": "FEDORA-2021-6a3024b3fd",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/"
},
{
"name": "FEDORA-2021-e71b05ba7b",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/"
},
{
"name": "GLSA-202208-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202208-02"
}
]
}
}
},
"adp": [
{
"providerMetadata": {
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE",
"dateUpdated": "2024-08-03T21:33:17.224Z"
},
"title": "CVE Program Container",
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw"
},
{
"name": "FEDORA-2021-6a3024b3fd",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MU47VKTNXX33ZDLTI2ORRUY3KLJKU6G/"
},
{
"name": "FEDORA-2021-e71b05ba7b",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HM7U5JNS5WU66Q3S26PFIU2ITB2ATTQ4/"
},
{
"name": "GLSA-202208-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202208-02"
}
]
}
]
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-27919",
"datePublished": "2021-03-11T00:00:13",
"dateReserved": "2021-03-03T00:00:00",
"dateUpdated": "2024-08-03T21:33:17.224Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
-- cves/2021/3xxx/CVE-2021-3115.json --
{
"containers": {
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Go before 1.14.14 and 1.15.x before 1.15.7 on Windows is vulnerable to Command Injection and remote code execution when using the \"go get\" command to fetch modules that make use of cgo (for example, cgo can execute a gcc program from an untrusted download)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-04T15:09:52",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://groups.google.com/g/golang-announce/c/mperVMGa98w"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://blog.golang.org/path-security"
},
{
"name": "FEDORA-2021-e435a8bb88",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWAYJGXWC232SG3UR3TR574E6BP3OSQQ/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20210219-0001/"
},
{
"name": "GLSA-202208-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202208-02"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-3115",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Go before 1.14.14 and 1.15.x before 1.15.7 on Windows is vulnerable to Command Injection and remote code execution when using the \"go get\" command to fetch modules that make use of cgo (for example, cgo can execute a gcc program from an untrusted download)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://groups.google.com/g/golang-announce/c/mperVMGa98w",
"refsource": "CONFIRM",
"url": "https://groups.google.com/g/golang-announce/c/mperVMGa98w"
},
{
"name": "https://blog.golang.org/path-security",
"refsource": "CONFIRM",
"url": "https://blog.golang.org/path-security"
},
{
"name": "FEDORA-2021-e435a8bb88",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWAYJGXWC232SG3UR3TR574E6BP3OSQQ/"
},
{
"name": "https://security.netapp.com/advisory/ntap-20210219-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20210219-0001/"
},
{
"name": "GLSA-202208-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202208-02"
}
]
}
}
},
"adp": [
{
"providerMetadata": {
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE",
"dateUpdated": "2024-08-03T16:45:51.223Z"
},
"title": "CVE Program Container",
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://groups.google.com/g/golang-announce/c/mperVMGa98w"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://blog.golang.org/path-security"
},
{
"name": "FEDORA-2021-e435a8bb88",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YWAYJGXWC232SG3UR3TR574E6BP3OSQQ/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20210219-0001/"
},
{
"name": "GLSA-202208-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202208-02"
}
]
}
]
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-3115",
"datePublished": "2021-01-26T02:14:51",
"dateReserved": "2021-01-11T00:00:00",
"dateUpdated": "2024-08-03T16:45:51.223Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
-- cves/2022/39xxx/CVE-2022-39213.json --
{
"containers": {
"cna": {
"affected": [
{
"product": "go-cvss",
"vendor": "pandatix",
"versions": [
{
"status": "affected",
"version": ">= 0.2.0, < 0.4.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "go-cvss is a Go module to manipulate Common Vulnerability Scoring System (CVSS). In affected versions when a full CVSS v2.0 vector string is parsed using `ParseVector`, an Out-of-Bounds Read is possible due to a lack of tests. The Go module will then panic. The problem is patched in tag `v0.4.0`, by the commit `d9d478ff0c13b8b09ace030db9262f3c2fe031f4`. Users are advised to upgrade. Users unable to upgrade may avoid this issue by parsing only CVSS v2.0 vector strings that do not have all attributes defined (e.g. `AV:N/AC:L/Au:N/C:P/I:P/A:C/E:U/RL:OF/RC:C/CDP:MH/TD:H/CR:M/IR:M/AR:M`). As stated in [SECURITY.md](https://github.com/pandatix/go-cvss/blob/master/SECURITY.md), the CPE v2.3 to refer to this Go module is `cpe:2.3:a:pandatix:go_cvss:*:*:*:*:*:*:*:*`. The entry has already been requested to the NVD CPE dictionary."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125: Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-09-15T21:45:12",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/pandatix/go-cvss/security/advisories/GHSA-xhmf-mmv2-4hhx"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/pandatix/go-cvss/commit/d9d478ff0c13b8b09ace030db9262f3c2fe031f4"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/pandatix/go-cvss/blob/master/SECURITY.md"
}
],
"source": {
"advisory": "GHSA-xhmf-mmv2-4hhx",
"discovery": "UNKNOWN"
},
"title": "Out-of-bounds Read in go-cvss",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2022-39213",
"STATE": "PUBLIC",
"TITLE": "Out-of-bounds Read in go-cvss"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "go-cvss",
"version": {
"version_data": [
{
"version_value": ">= 0.2.0, < 0.4.0"
}
]
}
}
]
},
"vendor_name": "pandatix"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "go-cvss is a Go module to manipulate Common Vulnerability Scoring System (CVSS). In affected versions when a full CVSS v2.0 vector string is parsed using `ParseVector`, an Out-of-Bounds Read is possible due to a lack of tests. The Go module will then panic. The problem is patched in tag `v0.4.0`, by the commit `d9d478ff0c13b8b09ace030db9262f3c2fe031f4`. Users are advised to upgrade. Users unable to upgrade may avoid this issue by parsing only CVSS v2.0 vector strings that do not have all attributes defined (e.g. `AV:N/AC:L/Au:N/C:P/I:P/A:C/E:U/RL:OF/RC:C/CDP:MH/TD:H/CR:M/IR:M/AR:M`). As stated in [SECURITY.md](https://github.com/pandatix/go-cvss/blob/master/SECURITY.md), the CPE v2.3 to refer to this Go module is `cpe:2.3:a:pandatix:go_cvss:*:*:*:*:*:*:*:*`. The entry has already been requested to the NVD CPE dictionary."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-125: Out-of-bounds Read"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/pandatix/go-cvss/security/advisories/GHSA-xhmf-mmv2-4hhx",
"refsource": "CONFIRM",
"url": "https://github.com/pandatix/go-cvss/security/advisories/GHSA-xhmf-mmv2-4hhx"
},
{
"name": "https://github.com/pandatix/go-cvss/commit/d9d478ff0c13b8b09ace030db9262f3c2fe031f4",
"refsource": "MISC",
"url": "https://github.com/pandatix/go-cvss/commit/d9d478ff0c13b8b09ace030db9262f3c2fe031f4"
},
{
"name": "https://github.com/pandatix/go-cvss/blob/master/SECURITY.md",
"refsource": "MISC",
"url": "https://github.com/pandatix/go-cvss/blob/master/SECURITY.md"
}
]
},
"source": {
"advisory": "GHSA-xhmf-mmv2-4hhx",
"discovery": "UNKNOWN"
}
}
},
"adp": [
{
"providerMetadata": {
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE",
"dateUpdated": "2024-08-03T12:00:42.462Z"
},
"title": "CVE Program Container",
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/pandatix/go-cvss/security/advisories/GHSA-xhmf-mmv2-4hhx"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/pandatix/go-cvss/commit/d9d478ff0c13b8b09ace030db9262f3c2fe031f4"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/pandatix/go-cvss/blob/master/SECURITY.md"
}
]
}
]
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2022-39213",
"datePublished": "2022-09-15T21:45:12",
"dateReserved": "2022-09-02T00:00:00",
"dateUpdated": "2024-08-03T12:00:42.462Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
-- cves/2023/29xxx/CVE-2023-29407.json --
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2023-29407",
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"state": "PUBLISHED",
"assignerShortName": "Go",
"dateReserved": "2023-04-05T19:36:35.043Z",
"datePublished": "2023-08-02T19:52:53.482Z",
"dateUpdated": "2024-08-02T14:07:45.991Z"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go",
"dateUpdated": "2023-08-02T19:52:53.482Z"
},
"title": "Excessive CPU consumption when decoding 0-height images in golang.org/x/image/tiff",
"descriptions": [
{
"lang": "en",
"value": "A maliciously-crafted image can cause excessive CPU consumption in decoding. A tiled image with a height of 0 and a very large width can cause excessive CPU consumption, despite the image size (width * height) appearing to be zero."
}
],
"affected": [
{
"vendor": "golang.org/x/image",
"product": "golang.org/x/image/tiff",
"collectionURL": "https://pkg.go.dev",
"packageName": "golang.org/x/image/tiff",
"versions": [
{
"version": "0",
"lessThan": "0.10.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "newDecoder"
},
{
"name": "Decode"
},
{
"name": "DecodeConfig"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-834: Excessive Iteration"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/61581"
},
{
"url": "https://go.dev/cl/514897"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1990"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230831-0009/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/"
}
],
"credits": [
{
"lang": "en",
"value": "Philippe Antoine (Catena cyber)"
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE",
"dateUpdated": "2024-08-02T14:07:45.991Z"
},
"title": "CVE Program Container",
"references": [
{
"url": "https://go.dev/issue/61581",
"tags": [
"x_transferred"
]
},
{
"url": "https://go.dev/cl/514897",
"tags": [
"x_transferred"
]
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1990",
"tags": [
"x_transferred"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230831-0009/",
"tags": [
"x_transferred"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO54NBDUJXKAZNGCFOEYL2LKK2RQP6K6/",
"tags": [
"x_transferred"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWH6Q7NVM4MV3GWFEU4PA67AWZHVFJQ2/",
"tags": [
"x_transferred"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZTEP6JYILRBNDTNWTEQ5D4QUUVQBESK/",
"tags": [
"x_transferred"
]
}
]
}
]
}
}
-- cves/2023/44xxx/CVE-2023-44378.json --
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2023-44378",
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"state": "PUBLISHED",
"assignerShortName": "GitHub_M",
"dateReserved": "2023-09-28T17:56:32.612Z",
"datePublished": "2023-10-09T13:33:54.973Z",
"dateUpdated": "2024-08-02T20:07:33.086Z"
},
"containers": {
"cna": {
"title": "gnark vulnerable to unsoundness in variable comparison/non-unique binary decomposition",
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-191",
"lang": "en",
"description": "CWE-191: Integer Underflow (Wrap or Wraparound)",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-697",
"lang": "en",
"description": "CWE-697: Incorrect Comparison",
"type": "CWE"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
}
}
],
"references": [
{
"name": "https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg"
},
{
"name": "https://github.com/zkopru-network/zkopru/issues/116",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/zkopru-network/zkopru/issues/116"
},
{
"name": "https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f"
}
],
"affected": [
{
"vendor": "Consensys",
"product": "gnark",
"versions": [
{
"version": "< 0.9.0",
"status": "affected"
}
]
}
],
"providerMetadata": {
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M",
"dateUpdated": "2023-10-09T13:33:54.973Z"
},
"descriptions": [
{
"lang": "en",
"value": "gnark is a zk-SNARK library that offers a high-level API to design circuits. Prior to version 0.9.0, for some in-circuit values, it is possible to construct two valid decomposition to bits. In addition to the canonical decomposition of `a`, for small values there exists a second decomposition for `a+r` (where `r` is the modulus the values are being reduced by). The second decomposition was possible due to overflowing the field where the values are defined. Upgrading to version 0.9.0 should fix the issue without needing to change the calls to value comparison methods."
}
],
"source": {
"advisory": "GHSA-498w-5j49-vqjg",
"discovery": "UNKNOWN"
}
},
"adp": [
{
"providerMetadata": {
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE",
"dateUpdated": "2024-08-02T20:07:33.086Z"
},
"title": "CVE Program Container",
"references": [
{
"name": "https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/Consensys/gnark/security/advisories/GHSA-498w-5j49-vqjg"
},
{
"name": "https://github.com/zkopru-network/zkopru/issues/116",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/zkopru-network/zkopru/issues/116"
},
{
"name": "https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/Consensys/gnark/commit/59a4087261a6c73f13e80d695c17b398c3d0934f"
}
]
}
]
}
}
-- cves/2023/45xxx/CVE-2023-45141.json --
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2023-45141",
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"state": "PUBLISHED",
"assignerShortName": "GitHub_M",
"dateReserved": "2023-10-04T16:02:46.329Z",
"datePublished": "2023-10-16T20:48:55.590Z",
"dateUpdated": "2024-08-02T20:14:18.365Z"
},
"containers": {
"cna": {
"title": "CSRF Token Validation Vulnerability in fiber",
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-352",
"lang": "en",
"description": "CWE-352: Cross-Site Request Forgery (CSRF)",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-565",
"lang": "en",
"description": "CWE-565: Reliance on Cookies without Validation and Integrity Checking",
"type": "CWE"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
}
}
],
"references": [
{
"name": "https://github.com/gofiber/fiber/security/advisories/GHSA-mv73-f69x-444p",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/gofiber/fiber/security/advisories/GHSA-mv73-f69x-444p"
}
],
"affected": [
{
"vendor": "gofiber",
"product": "fiber",
"versions": [
{
"version": "< 2.50.0",
"status": "affected"
}
]
}
],
"providerMetadata": {
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M",
"dateUpdated": "2023-10-16T20:48:55.590Z"
},
"descriptions": [
{
"lang": "en",
"value": "Fiber is an express inspired web framework written in Go. A Cross-Site Request Forgery (CSRF) vulnerability has been identified in the application, which allows an attacker to obtain tokens and forge malicious requests on behalf of a user. This can lead to unauthorized actions being taken on the user's behalf, potentially compromising the security and integrity of the application. The vulnerability is caused by improper validation and enforcement of CSRF tokens within the application. This vulnerability has been addressed in version 2.50.0 and users are advised to upgrade. Users should take additional security measures like captchas or Two-Factor Authentication (2FA) and set Session cookies with SameSite=Lax or SameSite=Secure, and the Secure and HttpOnly attributes."
}
],
"source": {
"advisory": "GHSA-mv73-f69x-444p",
"discovery": "UNKNOWN"
}
},
"adp": [
{
"providerMetadata": {
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE",
"dateUpdated": "2024-08-02T20:14:18.365Z"
},
"title": "CVE Program Container",
"references": [
{
"name": "https://github.com/gofiber/fiber/security/advisories/GHSA-mv73-f69x-444p",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/gofiber/fiber/security/advisories/GHSA-mv73-f69x-444p"
}
]
}
]
}
}
-- cves/2023/45xxx/CVE-2023-45283.json --
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2023-45283",
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"state": "PUBLISHED",
"assignerShortName": "Go",
"dateReserved": "2023-10-06T17:06:26.220Z",
"datePublished": "2023-11-09T16:30:12.395Z",
"dateUpdated": "2024-08-02T20:21:15.278Z"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go",
"dateUpdated": "2023-12-06T16:27:23.552Z"
},
"title": "Insecure parsing of Windows paths with a \\??\\ prefix in path/filepath",
"descriptions": [
{
"lang": "en",
"value": "The filepath package does not recognize paths with a \\??\\ prefix as special. On Windows, a path beginning with \\??\\ is a Root Local Device path equivalent to a path beginning with \\\\?\\. Paths with a \\??\\ prefix may be used to access arbitrary locations on the system. For example, the path \\??\\c:\\x is equivalent to the more common path c:\\x. Before fix, Clean could convert a rooted path such as \\a\\..\\??\\b into the root local device path \\??\\b. Clean will now convert this to .\\??\\b. Similarly, Join(\\, ??, b) could convert a seemingly innocent sequence of path elements into the root local device path \\??\\b. Join will now convert this to \\.\\??\\b. In addition, with fix, IsAbs now correctly reports paths beginning with \\??\\ as absolute, and VolumeName correctly reports the \\??\\ prefix as a volume name. UPDATE: Go 1.20.11 and Go 1.21.4 inadvertently changed the definition of the volume name in Windows paths starting with \\?, resulting in filepath.Clean(\\?\\c:) returning \\?\\c: rather than \\?\\c:\\ (among other effects). The previous behavior has been restored."
}
],
"affected": [
{
"vendor": "Go standard library",
"product": "path/filepath",
"collectionURL": "https://pkg.go.dev",
"packageName": "path/filepath",
"versions": [
{
"version": "0",
"lessThan": "1.20.11",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.21.0-0",
"lessThan": "1.21.4",
"status": "affected",
"versionType": "semver"
}
],
"platforms": [
"windows"
],
"programRoutines": [
{
"name": "Clean"
},
{
"name": "volumeNameLen"
},
{
"name": "join"
},
{
"name": "Abs"
},
{
"name": "Base"
},
{
"name": "Dir"
},
{
"name": "EvalSymlinks"
},
{
"name": "Glob"
},
{
"name": "IsLocal"
},
{
"name": "Join"
},
{
"name": "Rel"
},
{
"name": "Split"
},
{
"name": "VolumeName"
},
{
"name": "Walk"
},
{
"name": "WalkDir"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "Go standard library",
"product": "internal/safefilepath",
"collectionURL": "https://pkg.go.dev",
"packageName": "internal/safefilepath",
"versions": [
{
"version": "0",
"lessThan": "1.20.11",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.21.0-0",
"lessThan": "1.21.4",
"status": "affected",
"versionType": "semver"
}
],
"platforms": [
"windows"
],
"programRoutines": [
{
"name": "fromFS"
},
{
"name": "FromFS"
}
],
"defaultStatus": "unaffected"
},
{
"vendor": "Go standard library",
"product": "path/filepath",
"collectionURL": "https://pkg.go.dev",
"packageName": "path/filepath",
"versions": [
{
"version": "1.20.11",
"lessThan": "1.20.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.21.4",
"lessThan": "1.21.5",
"status": "affected",
"versionType": "semver"
}
],
"platforms": [
"windows"
],
"programRoutines": [
{
"name": "volumeNameLen"
},
{
"name": "Abs"
},
{
"name": "Base"
},
{
"name": "Clean"
},
{
"name": "Dir"
},
{
"name": "EvalSymlinks"
},
{
"name": "Glob"
},
{
"name": "IsLocal"
},
{
"name": "Join"
},
{
"name": "Rel"
},
{
"name": "Split"
},
{
"name": "VolumeName"
},
{
"name": "Walk"
},
{
"name": "WalkDir"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-41: Improper Resolution of Path Equivalence"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/63713"
},
{
"url": "https://go.dev/cl/540277"
},
{
"url": "https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY"
},
{
"url": "https://go.dev/issue/64028"
},
{
"url": "https://go.dev/cl/541175"
},
{
"url": "https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2185"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/12/05/2"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231214-0008/"
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE",
"dateUpdated": "2024-08-02T20:21:15.278Z"
},
"title": "CVE Program Container",
"references": [
{
"url": "https://go.dev/issue/63713",
"tags": [
"x_transferred"
]
},
{
"url": "https://go.dev/cl/540277",
"tags": [
"x_transferred"
]
},
{
"url": "https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY",
"tags": [
"x_transferred"
]
},
{
"url": "https://go.dev/issue/64028",
"tags": [
"x_transferred"
]
},
{
"url": "https://go.dev/cl/541175",
"tags": [
"x_transferred"
]
},
{
"url": "https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ",
"tags": [
"x_transferred"
]
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2185",
"tags": [
"x_transferred"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/12/05/2",
"tags": [
"x_transferred"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20231214-0008/",
"tags": [
"x_transferred"
]
}
]
}
]
}
}
-- cves/2023/45xxx/CVE-2023-45285.json --
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2023-45285",
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"state": "PUBLISHED",
"assignerShortName": "Go",
"dateReserved": "2023-10-06T17:06:26.220Z",
"datePublished": "2023-12-06T16:27:55.521Z",
"dateUpdated": "2024-08-02T20:21:15.349Z"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go",
"dateUpdated": "2023-12-06T16:27:55.521Z"
},
"title": "Command 'go get' may unexpectedly fallback to insecure git in cmd/go",
"descriptions": [
{
"lang": "en",
"value": "Using go get to fetch a module with the \".git\" suffix may unexpectedly fallback to the insecure \"git://\" protocol if the module is unavailable via the secure \"https://\" and \"git+ssh://\" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off)."
}
],
"affected": [
{
"vendor": "Go toolchain",
"product": "cmd/go",
"collectionURL": "https://pkg.go.dev",
"packageName": "cmd/go",
"versions": [
{
"version": "0",
"lessThan": "1.20.12",
"status": "affected",
"versionType": "semver"
},
{
"version": "1.21.0-0",
"lessThan": "1.21.5",
"status": "affected",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-636: Not Failing Securely ('Failing Open')"
}
]
}
],
"references": [
{
"url": "https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ"
},
{
"url": "https://go.dev/issue/63845"
},
{
"url": "https://go.dev/cl/540257"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2383"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIU6HOGV6RRIKWM57LOXQA75BGZSIH6G/"
}
],
"credits": [
{
"lang": "en",
"value": "David Leadbeater"
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE",
"dateUpdated": "2024-08-02T20:21:15.349Z"
},
"title": "CVE Program Container",
"references": [
{
"url": "https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ",
"tags": [
"x_transferred"
]
},
{
"url": "https://go.dev/issue/63845",
"tags": [
"x_transferred"
]
},
{
"url": "https://go.dev/cl/540257",
"tags": [
"x_transferred"
]
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2383",
"tags": [
"x_transferred"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIU6HOGV6RRIKWM57LOXQA75BGZSIH6G/",
"tags": [
"x_transferred"
]
}
]
}
]
}
}
-- cves/2023/45xxx/CVE-2023-45286.json --
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2023-45286",
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"state": "PUBLISHED",
"assignerShortName": "Go",
"dateReserved": "2023-10-06T17:06:26.221Z",
"datePublished": "2023-11-28T16:31:21.078Z",
"dateUpdated": "2024-08-28T20:01:23.626Z"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go",
"dateUpdated": "2024-01-04T18:41:48.460Z"
},
"title": "HTTP request body disclosure in github.com/go-resty/resty/v2",
"descriptions": [
{
"lang": "en",
"value": "A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body."
}
],
"affected": [
{
"vendor": "github.com/go-resty/resty/v2",
"product": "github.com/go-resty/resty/v2",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/go-resty/resty/v2",
"versions": [
{
"version": "2.10.0",
"lessThan": "2.11.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "handleRequestBody"
},
{
"name": "Backoff"
},
{
"name": "Request.Delete"
},
{
"name": "Request.Execute"
},
{
"name": "Request.Get"
},
{
"name": "Request.Head"
},
{
"name": "Request.Options"
},
{
"name": "Request.Patch"
},
{
"name": "Request.Post"
},
{
"name": "Request.Put"
},
{
"name": "Request.Send"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
}
]
}
],
"references": [
{
"url": "https://github.com/go-resty/resty/issues/743"
},
{
"url": "https://github.com/go-resty/resty/issues/739"
},
{
"url": "https://github.com/go-resty/resty/pull/745"
},
{
"url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2328"
}
],
"credits": [
{
"lang": "en",
"value": "Logan Attwood (@lattwood)"
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE",
"dateUpdated": "2024-08-02T20:21:15.309Z"
},
"title": "CVE Program Container",
"references": [
{
"url": "https://github.com/go-resty/resty/issues/743",
"tags": [
"x_transferred"
]
},
{
"url": "https://github.com/go-resty/resty/issues/739",
"tags": [
"x_transferred"
]
},
{
"url": "https://github.com/go-resty/resty/pull/745",
"tags": [
"x_transferred"
]
},
{
"url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e",
"tags": [
"x_transferred"
]
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2328",
"tags": [
"x_transferred"
]
}
]
},
{
"metrics": [
{
"other": {
"type": "ssvc",
"content": {
"timestamp": "2024-08-28T20:00:00.708483Z",
"id": "CVE-2023-45286",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"version": "2.0.3"
}
}
}
],
"title": "CISA ADP Vulnrichment",
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2024-08-28T20:01:23.626Z"
}
}
]
}
}
-- cves/2024/2xxx/CVE-2024-2056.json --
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2024-2056",
"assignerOrgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"state": "PUBLISHED",
"assignerShortName": "AHA",
"dateReserved": "2024-03-01T02:03:12.654Z",
"datePublished": "2024-03-05T18:57:03.524Z",
"dateUpdated": "2024-08-23T20:31:03.176Z"
},
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Artica Proxy",
"vendor": "Artica Tech",
"versions": [
{
"status": "affected",
"version": "4.50"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Jim Becher of KoreLogic, Inc."
},
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Jaggar Henry of KoreLogic, Inc."
}
],
"datePublic": "2024-03-05T18:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the \"tailon\" service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at <span style=\"background-color: rgb(252, 252, 252);\">gvalkov's 'tailon' GitHub repo</span>. Using the tailon service, the contents of any file on the Artica Proxy can be viewed."
}
],
"value": "Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the \"tailon\" service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at gvalkov's 'tailon' GitHub repo. Using the tailon service, the contents of any file on the Artica Proxy can be viewed."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-288",
"description": "CWE-288 Authentication Bypass Using an Alternate Path or Channel",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-552",
"description": "CWE-552 Files or Directories Accessible to External Parties",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"orgId": "26969f82-7e87-44d8-9cb5-f6fb926ddd43",
"shortName": "AHA",
"dateUpdated": "2024-03-05T18:59:28.493Z"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt"
},
{
"tags": [
"related"
],
"url": "https://github.com/gvalkov/tailon#security"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/14"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Artica Proxy Loopback Services Remotely Accessible Unauthenticated",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
},
"adp": [
{
"providerMetadata": {
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE",
"dateUpdated": "2024-08-01T19:03:38.787Z"
},
"title": "CVE Program Container",
"references": [
{
"tags": [
"third-party-advisory",
"x_transferred"
],
"url": "https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt"
},
{
"tags": [
"related",
"x_transferred"
],
"url": "https://github.com/gvalkov/tailon#security"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/14",
"tags": [
"x_transferred"
]
}
]
},
{
"affected": [
{
"vendor": "articatech",
"product": "artica_proxy",
"cpes": [
"cpe:2.3:a:articatech:artica_proxy:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"versions": [
{
"version": "4.50",
"status": "affected"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"scope": "UNCHANGED",
"version": "3.1",
"baseScore": 9.8,
"attackVector": "NETWORK",
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"integrityImpact": "HIGH",
"userInteraction": "NONE",
"attackComplexity": "LOW",
"availabilityImpact": "HIGH",
"privilegesRequired": "NONE",
"confidentialityImpact": "HIGH"
}
},
{
"other": {
"type": "ssvc",
"content": {
"timestamp": "2024-08-23T20:29:37.739652Z",
"id": "CVE-2024-2056",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"version": "2.0.3"
}
}
}
],
"title": "CISA ADP Vulnrichment",
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2024-08-23T20:31:03.176Z"
}
}
]
}
}
-- cves/2024/21xxx/CVE-2024-21527.json --
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2024-21527",
"assignerOrgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730",
"state": "PUBLISHED",
"assignerShortName": "snyk",
"dateReserved": "2023-12-22T12:33:20.122Z",
"datePublished": "2024-07-19T05:00:04.457Z",
"dateUpdated": "2024-09-05T13:26:11.327Z"
},
"containers": {
"cna": {
"metrics": [
{
"cvssV3_1": {
"version": "3.1",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:P"
}
}
],
"credits": [
{
"value": "Filip Ochnik",
"lang": "en"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-918",
"description": "Server-side Request Forgery (SSRF)",
"lang": "en"
}
]
}
],
"providerMetadata": {
"orgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730",
"shortName": "snyk",
"dateUpdated": "2024-09-05T13:26:11.327Z"
},
"descriptions": [
{
"value": "Versions of the package github.com/gotenberg/gotenberg/v8/pkg/gotenberg before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/chromium before 8.1.0; versions of the package github.com/gotenberg/gotenberg/v8/pkg/modules/webhook before 8.1.0 are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when a request is made to a file via localhost, such as <iframe src=\"\\\\localhost/etc/passwd\">. By exploiting this vulnerability, an attacker can achieve local file inclusion, allowing of sensitive files read on the host system.\r\r Workaround\rAn alternative is using either or both --chromium-deny-list and --chromium-allow-list flags.",
"lang": "en"
}
],
"references": [
{
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGGOTENBERG-7537081"
},
{
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGMODULESCHROMIUM-7537082"
},
{
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGMODULESWEBHOOK-7537083"
},
{
"url": "https://github.com/gotenberg/gotenberg/releases/tag/v8.1.0"
},
{
"url": "https://github.com/gotenberg/gotenberg/commit/ad152e62e5124b673099a9103eb6e7f933771794"
},
{
"url": "https://gist.github.com/filipochnik/bc88a3d1cc17c07cec391ee98e1e6356"
}
],
"affected": [
{
"product": "github.com/gotenberg/gotenberg/v8/pkg/gotenberg",
"versions": [
{
"version": "0",
"lessThan": "8.1.0",
"status": "affected",
"versionType": "semver"
}
],
"vendor": "n/a"
},
{
"product": "github.com/gotenberg/gotenberg/v8/pkg/modules/chromium",
"versions": [
{
"version": "0",
"lessThan": "8.1.0",
"status": "affected",
"versionType": "semver"
}
],
"vendor": "n/a"
},
{
"product": "github.com/gotenberg/gotenberg/v8/pkg/modules/webhook",
"versions": [
{
"version": "0",
"lessThan": "8.1.0",
"status": "affected",
"versionType": "semver"
}
],
"vendor": "n/a"
}
]
},
"adp": [
{
"affected": [
{
"vendor": "gotenberg",
"product": "gotenberg",
"cpes": [
"cpe:2.3:a:gotenberg:gotenberg:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"versions": [
{
"version": "0",
"status": "affected",
"lessThan": "8.1.0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"type": "ssvc",
"content": {
"timestamp": "2024-07-23T14:34:36.236052Z",
"id": "CVE-2024-21527",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"version": "2.0.3"
}
}
}
],
"title": "CISA ADP Vulnrichment",
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2024-07-23T14:35:48.752Z"
}
},
{
"providerMetadata": {
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE",
"dateUpdated": "2024-08-01T22:27:34.824Z"
},
"title": "CVE Program Container",
"references": [
{
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGGOTENBERG-7537081",
"tags": [
"x_transferred"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGMODULESCHROMIUM-7537082",
"tags": [
"x_transferred"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGOTENBERGGOTENBERGV8PKGMODULESWEBHOOK-7537083",
"tags": [
"x_transferred"
]
},
{
"url": "https://github.com/gotenberg/gotenberg/releases/tag/v8.1.0",
"tags": [
"x_transferred"
]
},
{
"url": "https://github.com/gotenberg/gotenberg/commit/ad152e62e5124b673099a9103eb6e7f933771794",
"tags": [
"x_transferred"
]
},
{
"url": "https://gist.github.com/filipochnik/bc88a3d1cc17c07cec391ee98e1e6356",
"tags": [
"x_transferred"
]
}
]
}
]
}
}
-- cves/2024/21xxx/CVE-2024-21583.json --
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2024-21583",
"assignerOrgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730",
"state": "PUBLISHED",
"assignerShortName": "snyk",
"dateReserved": "2023-12-22T12:33:20.132Z",
"datePublished": "2024-07-19T05:00:01.569Z",
"dateUpdated": "2024-08-01T22:27:34.499Z"
},
"containers": {
"cna": {
"metrics": [
{
"cvssV3_1": {
"version": "3.1",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N/E:P"
}
}
],
"credits": [
{
"value": "Elliot Ward (Snyk Security Research)",
"lang": "en"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-15",
"description": "Cookie Tossing",
"lang": "en"
}
]
}
],
"providerMetadata": {
"orgId": "bae035ff-b466-4ff4-94d0-fc9efd9e1730",
"shortName": "snyk",
"dateUpdated": "2024-07-19T05:00:01.569Z"
},
"descriptions": [
{
"value": "Versions of the package github.com/gitpod-io/gitpod/components/server/go/pkg/lib before main-gha.27122; versions of the package github.com/gitpod-io/gitpod/components/ws-proxy/pkg/proxy before main-gha.27122; versions of the package github.com/gitpod-io/gitpod/install/installer/pkg/components/auth before main-gha.27122; versions of the package github.com/gitpod-io/gitpod/install/installer/pkg/components/public-api-server before main-gha.27122; versions of the package github.com/gitpod-io/gitpod/install/installer/pkg/components/server before main-gha.27122; versions of the package @gitpod/gitpod-protocol before 0.1.5-main-gha.27122 are vulnerable to Cookie Tossing due to a missing __Host- prefix on the _gitpod_io_jwt2_ session cookie. This allows an adversary who controls a subdomain to set the value of the cookie on the Gitpod control plane, which can be assigned to an attacker’s own JWT so that specific actions taken by the victim (such as connecting a new Github organization) are actioned by the attackers session.",
"lang": "en"
}
],
"references": [
{
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGITPODIOGITPODCOMPONENTSSERVERGOPKGLIB-7452074"
},
{
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGITPODIOGITPODCOMPONENTSWSPROXYPKGPROXY-7452075"
},
{
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGITPODIOGITPODINSTALLINSTALLERPKGCOMPONENTSAUTH-7452076"
},
{
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGITPODIOGITPODINSTALLINSTALLERPKGCOMPONENTSPUBLICAPISERVER-7452077"
},
{
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGITPODIOGITPODINSTALLINSTALLERPKGCOMPONENTSSERVER-7452078"
},
{
"url": "https://security.snyk.io/vuln/SNYK-JS-GITPODGITPODPROTOCOL-7452079"
},
{
"url": "https://app.safebase.io/portal/71ccd717-aa2d-4a1e-942e-c768d37e9e0c/preview?product=%5B%E2%80%A6%5D942e-c768d37e9e0c&tcuUid=1d505bda-9a38-4ca5-8724-052e6337f34d"
},
{
"url": "https://github.com/gitpod-io/gitpod/pull/19973"
},
{
"url": "https://github.com/gitpod-io/gitpod/commit/da1053e1013f27a56e6d3533aa251dbd241d0155"
}
],
"affected": [
{
"product": "github.com/gitpod-io/gitpod/components/server/go/pkg/lib",
"versions": [
{
"version": "0",
"lessThan": "main-gha.27122",
"status": "affected",
"versionType": "semver"
}
],
"vendor": "n/a"
},
{
"product": "github.com/gitpod-io/gitpod/components/ws-proxy/pkg/proxy",
"versions": [
{
"version": "0",
"lessThan": "main-gha.27122",
"status": "affected",
"versionType": "semver"
}
],
"vendor": "n/a"
},
{
"product": "github.com/gitpod-io/gitpod/install/installer/pkg/components/auth",
"versions": [
{
"version": "0",
"lessThan": "main-gha.27122",
"status": "affected",
"versionType": "semver"
}
],
"vendor": "n/a"
},
{
"product": "github.com/gitpod-io/gitpod/install/installer/pkg/components/public-api-server",
"versions": [
{
"version": "0",
"lessThan": "main-gha.27122",
"status": "affected",
"versionType": "semver"
}
],
"vendor": "n/a"
},
{
"product": "github.com/gitpod-io/gitpod/install/installer/pkg/components/server",
"versions": [
{
"version": "0",
"lessThan": "main-gha.27122",
"status": "affected",
"versionType": "semver"
}
],
"vendor": "n/a"
},
{
"product": "@gitpod/gitpod-protocol",
"versions": [
{
"version": "0",
"lessThan": "0.1.5-main-gha.27122",
"status": "affected",
"versionType": "semver"
}
],
"vendor": "n/a"
}
]
},
"adp": [
{
"metrics": [
{
"other": {
"type": "ssvc",
"content": {
"timestamp": "2024-07-19T12:27:45.663149Z",
"id": "CVE-2024-21583",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"version": "2.0.3"
}
}
}
],
"title": "CISA ADP Vulnrichment",
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2024-07-23T14:26:34.947Z"
}
},
{
"providerMetadata": {
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE",
"dateUpdated": "2024-08-01T22:27:34.499Z"
},
"title": "CVE Program Container",
"references": [
{
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGITPODIOGITPODCOMPONENTSSERVERGOPKGLIB-7452074",
"tags": [
"x_transferred"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGITPODIOGITPODCOMPONENTSWSPROXYPKGPROXY-7452075",
"tags": [
"x_transferred"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGITPODIOGITPODINSTALLINSTALLERPKGCOMPONENTSAUTH-7452076",
"tags": [
"x_transferred"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGITPODIOGITPODINSTALLINSTALLERPKGCOMPONENTSPUBLICAPISERVER-7452077",
"tags": [
"x_transferred"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGITPODIOGITPODINSTALLINSTALLERPKGCOMPONENTSSERVER-7452078",
"tags": [
"x_transferred"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-JS-GITPODGITPODPROTOCOL-7452079",
"tags": [
"x_transferred"
]
},
{
"url": "https://app.safebase.io/portal/71ccd717-aa2d-4a1e-942e-c768d37e9e0c/preview?product=%5B%E2%80%A6%5D942e-c768d37e9e0c&tcuUid=1d505bda-9a38-4ca5-8724-052e6337f34d",
"tags": [
"x_transferred"
]
},
{
"url": "https://github.com/gitpod-io/gitpod/pull/19973",
"tags": [
"x_transferred"
]
},
{
"url": "https://github.com/gitpod-io/gitpod/commit/da1053e1013f27a56e6d3533aa251dbd241d0155",
"tags": [
"x_transferred"
]
}
]
}
]
}
}
-- cves/2024/3xxx/CVE-2024-3094.json --
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2024-3094",
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"state": "PUBLISHED",
"assignerShortName": "redhat",
"dateReserved": "2024-03-29T15:38:13.249Z",
"datePublished": "2024-03-29T16:51:12.588Z",
"dateUpdated": "2024-08-20T17:24:56.165Z"
},
"containers": {
"cna": {
"title": "Xz: malicious code in distributed source",
"metrics": [
{
"other": {
"content": {
"value": "Critical",
"namespace": "https://access.redhat.com/security/updates/classification/"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"descriptions": [
{
"lang": "en",
"value": "Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. \r\nThrough a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library."
}
],
"affected": [
{
"versions": [
{
"status": "affected",
"version": "5.6.0"
},
{
"status": "affected",
"version": "5.6.1"
}
],
"packageName": "xz",
"collectionURL": "https://github.com/tukaani-project/xz",
"defaultStatus": "unaffected"
},
{
"vendor": "Red Hat",
"product": "Red Hat Enterprise Linux 6",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "xz",
"defaultStatus": "unaffected",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
]
},
{
"vendor": "Red Hat",
"product": "Red Hat Enterprise Linux 7",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "xz",
"defaultStatus": "unaffected",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7"
]
},
{
"vendor": "Red Hat",
"product": "Red Hat Enterprise Linux 8",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "xz",
"defaultStatus": "unaffected",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
]
},
{
"vendor": "Red Hat",
"product": "Red Hat Enterprise Linux 9",
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"packageName": "xz",
"defaultStatus": "unaffected",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9"
]
},
{
"vendor": "Red Hat",
"product": "Red Hat JBoss Enterprise Application Platform 8",
"collectionURL": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html",
"packageName": "xz",
"defaultStatus": "unaffected",
"cpes": [
"cpe:/a:redhat:jboss_enterprise_application_platform:8"
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/29/10"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/29/12"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/29/4"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/29/5"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/29/8"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/30/12"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/30/27"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/30/36"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/30/5"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/16/5"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-3094",
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
]
},
{
"url": "https://ariadne.space/2024/04/02/the-xz-utils-backdoor-is-a-symptom-of-a-larger-problem/"
},
{
"url": "https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ssh-connections/"
},
{
"url": "https://aws.amazon.com/security/security-bulletins/AWS-2024-002/"
},
{
"url": "https://blog.netbsd.org/tnf/entry/statement_on_backdoor_in_xz"
},
{
"url": "https://boehs.org/node/everything-i-know-about-the-xz-backdoor"
},
{
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068024"
},
{
"url": "https://bugs.gentoo.org/928134"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272210",
"name": "RHBZ#2272210",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
]
},
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1222124"
},
{
"url": "https://discourse.nixos.org/t/cve-2024-3094-malicious-code-in-xz-5-6-0-and-5-6-1-tarballs/42405"
},
{
"url": "https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27"
},
{
"url": "https://github.com/advisories/GHSA-rxwq-x6h5-x525"
},
{
"url": "https://github.com/amlweems/xzbot"
},
{
"url": "https://github.com/karcherm/xz-malware"
},
{
"url": "https://gynvael.coldwind.pl/?lang=en&id=782"
},
{
"url": "https://lists.debian.org/debian-security-announce/2024/msg00057.html"
},
{
"url": "https://lists.freebsd.org/archives/freebsd-security/2024-March/000248.html"
},
{
"url": "https://lwn.net/Articles/967180/"
},
{
"url": "https://news.ycombinator.com/item?id=39865810"
},
{
"url": "https://news.ycombinator.com/item?id=39877267"
},
{
"url": "https://news.ycombinator.com/item?id=39895344"
},
{
"url": "https://openssf.org/blog/2024/03/30/xz-backdoor-cve-2024-3094/"
},
{
"url": "https://research.swtch.com/xz-script"
},
{
"url": "https://research.swtch.com/xz-timeline"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2024-3094"
},
{
"url": "https://security.alpinelinux.org/vuln/CVE-2024-3094"
},
{
"url": "https://security.archlinux.org/CVE-2024-3094"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240402-0001/"
},
{
"url": "https://tukaani.org/xz-backdoor/"
},
{
"url": "https://twitter.com/LetsDefendIO/status/1774804387417751958"
},
{
"url": "https://twitter.com/debian/status/1774219194638409898"
},
{
"url": "https://twitter.com/infosecb/status/1774595540233167206"
},
{
"url": "https://twitter.com/infosecb/status/1774597228864139400"
},
{
"url": "https://ubuntu.com/security/CVE-2024-3094"
},
{
"url": "https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094"
},
{
"url": "https://www.darkreading.com/vulnerabilities-threats/are-you-affected-by-the-backdoor-in-xz-utils"
},
{
"url": "https://www.kali.org/blog/about-the-xz-backdoor/"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/03/29/4"
},
{
"url": "https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users"
},
{
"url": "https://www.tenable.com/blog/frequently-asked-questions-cve-2024-3094-supply-chain-backdoor-in-xz-utils"
},
{
"url": "https://www.theregister.com/2024/03/29/malicious_backdoor_xz/"
},
{
"url": "https://www.vicarius.io/vsociety/vulnerabilities/cve-2024-3094"
},
{
"url": "https://xeiaso.net/notes/2024/xz-vuln/"
}
],
"datePublic": "2024-03-29T00:00:00+00:00",
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-506",
"description": "Embedded Malicious Code",
"lang": "en",
"type": "CWE"
}
]
}
],
"x_redhatCweChain": "CWE-506: Embedded Malicious Code",
"timeline": [
{
"lang": "en",
"time": "2024-03-27T00:00:00+00:00",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2024-03-29T00:00:00+00:00",
"value": "Made public."
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Andres Freund for reporting this issue."
}
],
"providerMetadata": {
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat",
"dateUpdated": "2024-08-20T17:24:56.165Z"
}
},
"adp": [
{
"metrics": [
{
"other": {
"type": "ssvc",
"content": {
"timestamp": "2024-04-02T04:00:23.138684Z",
"id": "CVE-2024-3094",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"version": "2.0.3"
}
}
}
],
"title": "CISA ADP Vulnrichment",
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2024-07-30T15:37:17.662Z"
}
},
{
"providerMetadata": {
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE",
"dateUpdated": "2024-08-01T19:32:42.679Z"
},
"title": "CVE Program Container",
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-3094",
"tags": [
"vdb-entry",
"x_refsource_REDHAT",
"x_transferred"
]
},
{
"url": "https://ariadne.space/2024/04/02/the-xz-utils-backdoor-is-a-symptom-of-a-larger-problem/",
"tags": [
"x_transferred"
]
},
{
"url": "https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ssh-connections/",
"tags": [
"x_transferred"
]
},
{
"url": "https://aws.amazon.com/security/security-bulletins/AWS-2024-002/",
"tags": [
"x_transferred"
]
},
{
"url": "https://blog.netbsd.org/tnf/entry/statement_on_backdoor_in_xz",
"tags": [
"x_transferred"
]
},
{
"url": "https://boehs.org/node/everything-i-know-about-the-xz-backdoor",
"tags": [
"x_transferred"
]
},
{
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068024",
"tags": [
"x_transferred"
]
},
{
"url": "https://bugs.gentoo.org/928134",
"tags": [
"x_transferred"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272210",
"name": "RHBZ#2272210",
"tags": [
"issue-tracking",
"x_refsource_REDHAT",
"x_transferred"
]
},
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1222124",
"tags": [
"x_transferred"
]
},
{
"url": "https://discourse.nixos.org/t/cve-2024-3094-malicious-code-in-xz-5-6-0-and-5-6-1-tarballs/42405",
"tags": [
"x_transferred"
]
},
{
"url": "https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27",
"tags": [
"x_transferred"
]
},
{
"url": "https://github.com/advisories/GHSA-rxwq-x6h5-x525",
"tags": [
"x_transferred"
]
},
{
"url": "https://github.com/amlweems/xzbot",
"tags": [
"x_transferred"
]
},
{
"url": "https://github.com/karcherm/xz-malware",
"tags": [
"x_transferred"
]
},
{
"url": "https://gynvael.coldwind.pl/?lang=en&id=782",
"tags": [
"x_transferred"
]
},
{
"url": "https://lists.debian.org/debian-security-announce/2024/msg00057.html",
"tags": [
"x_transferred"
]
},
{
"url": "https://lists.freebsd.org/archives/freebsd-security/2024-March/000248.html",
"tags": [
"x_transferred"
]
},
{
"url": "https://lwn.net/Articles/967180/",
"tags": [
"x_transferred"
]
},
{
"url": "https://news.ycombinator.com/item?id=39865810",
"tags": [
"x_transferred"
]
},
{
"url": "https://news.ycombinator.com/item?id=39877267",
"tags": [
"x_transferred"
]
},
{
"url": "https://news.ycombinator.com/item?id=39895344",
"tags": [
"x_transferred"
]
},
{
"url": "https://openssf.org/blog/2024/03/30/xz-backdoor-cve-2024-3094/",
"tags": [
"x_transferred"
]
},
{
"url": "https://research.swtch.com/xz-script",
"tags": [
"x_transferred"
]
},
{
"url": "https://research.swtch.com/xz-timeline",
"tags": [
"x_transferred"
]
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2024-3094",
"tags": [
"x_transferred"
]
},
{
"url": "https://security.alpinelinux.org/vuln/CVE-2024-3094",
"tags": [
"x_transferred"
]
},
{
"url": "https://security.archlinux.org/CVE-2024-3094",
"tags": [
"x_transferred"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240402-0001/",
"tags": [
"x_transferred"
]
},
{
"url": "https://tukaani.org/xz-backdoor/",
"tags": [
"x_transferred"
]
},
{
"url": "https://twitter.com/LetsDefendIO/status/1774804387417751958",
"tags": [
"x_transferred"
]
},
{
"url": "https://twitter.com/debian/status/1774219194638409898",
"tags": [
"x_transferred"
]
},
{
"url": "https://twitter.com/infosecb/status/1774595540233167206",
"tags": [
"x_transferred"
]
},
{
"url": "https://twitter.com/infosecb/status/1774597228864139400",
"tags": [
"x_transferred"
]
},
{
"url": "https://ubuntu.com/security/CVE-2024-3094",
"tags": [
"x_transferred"
]
},
{
"url": "https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094",
"tags": [
"x_transferred"
]
},
{
"url": "https://www.darkreading.com/vulnerabilities-threats/are-you-affected-by-the-backdoor-in-xz-utils",
"tags": [
"x_transferred"
]
},
{
"url": "https://www.kali.org/blog/about-the-xz-backdoor/",
"tags": [
"x_transferred"
]
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/03/29/4",
"tags": [
"x_transferred"
]
},
{
"url": "https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users",
"tags": [
"x_transferred"
]
},
{
"url": "https://www.tenable.com/blog/frequently-asked-questions-cve-2024-3094-supply-chain-backdoor-in-xz-utils",
"tags": [
"x_transferred"
]
},
{
"url": "https://www.theregister.com/2024/03/29/malicious_backdoor_xz/",
"tags": [
"x_transferred"
]
},
{
"url": "https://www.vicarius.io/vsociety/vulnerabilities/cve-2024-3094",
"tags": [
"x_transferred"
]
},
{
"url": "https://xeiaso.net/notes/2024/xz-vuln/",
"tags": [
"x_transferred"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/30/12",
"tags": [
"x_transferred"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/30/27",
"tags": [
"x_transferred"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/29/12",
"tags": [
"x_transferred"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/29/10",
"tags": [
"x_transferred"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/30/36",
"tags": [
"x_transferred"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/16/5",
"tags": [
"x_transferred"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/29/8",
"tags": [
"x_transferred"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/30/5",
"tags": [
"x_transferred"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/29/5",
"tags": [
"x_transferred"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/29/4",
"tags": [
"x_transferred"
]
}
]
}
]
}
}
-- cves/2024/33xxx/CVE-2024-33522.json --
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2024-33522",
"assignerOrgId": "e6d453f4-3dae-4941-bcea-9af25f4e824d",
"state": "PUBLISHED",
"assignerShortName": "Tigera",
"dateReserved": "2024-04-23T16:32:33.170Z",
"datePublished": "2024-04-29T22:19:06.908Z",
"dateUpdated": "2024-08-02T02:36:04.113Z"
},
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageName": "cni-plugin",
"product": "Calico",
"repo": "https://www.tigera.io/tigera-products/calico/",
"vendor": "Tigera",
"versions": [
{
"lessThan": "v3.26.5",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"lessThan": "v3.27.3",
"status": "affected",
"version": "v3.27.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "v3.28.0"
}
]
},
{
"defaultStatus": "unaffected",
"packageName": "cni-plugin",
"product": "Calico Enterprise ",
"vendor": "Tigera",
"versions": [
{
"lessThan": "v3.17.4",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"lessThan": "v3.18.2",
"status": "affected",
"version": "v3.18.0",
"versionType": "semver"
},
{
"lessThan": "v3.19.0-2.0",
"status": "affected",
"version": "v3.19.0-1.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"packageName": "cni-plugin",
"product": "Calico Cloud",
"vendor": "Tigera",
"versions": [
{
"lessThan": "v19.3.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Christopher Alonso (Github: @latortuga71)"
},
{
"lang": "en",
"type": "remediation reviewer",
"value": "Anthony Tam"
},
{
"lang": "en",
"type": "remediation verifier",
"value": "Behnam Shobiri"
},
{
"lang": "en",
"type": "remediation developer",
"value": "Pedro Coutinho"
},
{
"lang": "en",
"type": "remediation reviewer",
"value": "Matt Dupre"
}
],
"datePublic": "2024-04-29T19:57:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<span style=\"background-color: transparent;\">In vulnerable </span><span style=\"background-color: transparent;\">versions of Calico (v3.27.2 and below), Calico Enterprise (v3.19.0-1, v3.18.1, v3.17.3 and below), and Calico Cloud (v19.2.0 and below), an attacker who has local access to the Kubernetes node, can escalate their privileges by exploiting a vulnerability in the Calico CNI install binary. The issue arises from an incorrect SUID (Set User ID) bit configuration in the binary, combined with the ability to control the input binary, allowing an attacker to execute an arbitrary binary with elevated privileges.</span><br>"
}
],
"value": "In vulnerable versions of Calico (v3.27.2 and below), Calico Enterprise (v3.19.0-1, v3.18.1, v3.17.3 and below), and Calico Cloud (v19.2.0 and below), an attacker who has local access to the Kubernetes node, can escalate their privileges by exploiting a vulnerability in the Calico CNI install binary. The issue arises from an incorrect SUID (Set User ID) bit configuration in the binary, combined with the ability to control the input binary, allowing an attacker to execute an arbitrary binary with elevated privileges.\n"
}
],
"impacts": [
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233 Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "CWE-269 Improper Privilege Management",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"orgId": "e6d453f4-3dae-4941-bcea-9af25f4e824d",
"shortName": "Tigera",
"dateUpdated": "2024-04-29T22:19:06.908Z"
},
"references": [
{
"tags": [
"exploit",
"issue-tracking"
],
"url": "https://github.com/projectcalico/calico/issues/7981"
},
{
"tags": [
"patch"
],
"url": "https://github.com/projectcalico/calico/pull/8447"
},
{
"tags": [
"patch"
],
"url": "https://github.com/projectcalico/calico/pull/8517"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://www.tigera.io/security-bulletins-tta-2024-001/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Privilege escalation in Calico CNI install binary",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
},
"adp": [
{
"affected": [
{
"vendor": "tigera",
"product": "calico",
"cpes": [
"cpe:2.3:a:tigera:calico:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"lessThan": "v3.26.5",
"versionType": "semver"
},
{
"version": "v3.27.0",
"status": "affected",
"lessThan": "v3.27.3",
"versionType": "semver"
},
{
"version": "v3.28.0",
"status": "unaffected"
}
]
},
{
"vendor": "tigera",
"product": "calico_enterprise",
"cpes": [
"cpe:2.3:a:tigera:calico_enterprise:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"lessThan": "v3.17.4",
"versionType": "semver"
},
{
"version": "v3.18.0",
"status": "affected",
"lessThan": "v3.18.2",
"versionType": "semver"
},
{
"version": "v3.19.0-1.0",
"status": "affected",
"lessThan": "v3.19.0-2.0",
"versionType": "semver"
}
]
},
{
"vendor": "tigera",
"product": "calico_cloud",
"cpes": [
"cpe:2.3:a:tigera:calico_cloud:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"lessThan": "v19.3.0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"type": "ssvc",
"content": {
"timestamp": "2024-06-12T16:51:23.967533Z",
"id": "CVE-2024-33522",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"version": "2.0.3"
}
}
}
],
"title": "CISA ADP Vulnrichment",
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2024-06-12T17:09:59.549Z"
}
},
{
"providerMetadata": {
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE",
"dateUpdated": "2024-08-02T02:36:04.113Z"
},
"title": "CVE Program Container",
"references": [
{
"tags": [
"exploit",
"issue-tracking",
"x_transferred"
],
"url": "https://github.com/projectcalico/calico/issues/7981"
},
{
"tags": [
"patch",
"x_transferred"
],
"url": "https://github.com/projectcalico/calico/pull/8447"
},
{
"tags": [
"patch",
"x_transferred"
],
"url": "https://github.com/projectcalico/calico/pull/8517"
},
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.tigera.io/security-bulletins-tta-2024-001/"
}
]
}
]
}
}