blob: 5f393655b602c668c63c3d5efbb7859fa02f1a4f [file] [log] [blame]
{
"schema_version": "1.3.1",
"id": "GO-2022-1118",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2022-39199",
"GHSA-6cqj-6969-p57x"
],
"summary": "Improper validation of UUIDs in github.com/codenotary/immudb",
"details": "A malicious server can trick a client into treating it as a different server by changing the reported UUID.\n\nimmudb client SDKs use the server's UUID to distinguish between different server instance so that the client can connect to different immudb instances and keep the state for multiple servers. The SDK does not validate this UUID and accepts any value reported by the server. A malicious server can therefore change the reported UUID and trick the client into treating it as a different server.",
"affected": [
{
"package": {
"name": "github.com/codenotary/immudb",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.4.1"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/codenotary/immudb/pkg/client",
"symbols": [
"DefaultOptions",
"NewClient",
"NewImmuClient",
"immuClient.OpenSession"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/codenotary/immudb/security/advisories/GHSA-6cqj-6969-p57x"
},
{
"type": "FIX",
"url": "https://github.com/codenotary/immudb/commit/cade04756ff3f0a3b9e8d24149062744574adf5d"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-1118"
}
}