data/reports: add 5 unreviewed reports
- data/reports/GO-2024-3294.yaml
- data/reports/GO-2024-3296.yaml
- data/reports/GO-2024-3299.yaml
- data/reports/GO-2024-3300.yaml
- data/reports/GO-2024-3303.yaml
Fixes golang/vulndb#3294
Fixes golang/vulndb#3296
Fixes golang/vulndb#3299
Fixes golang/vulndb#3300
Fixes golang/vulndb#3303
Change-Id: I0f474a123c1df553293cac4ab062b4cdb1011ec1
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/632976
Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
Reviewed-by: Zvonimir Pavlinovic <zpavlinovic@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
diff --git a/data/osv/GO-2024-3294.json b/data/osv/GO-2024-3294.json
new file mode 100644
index 0000000..ee8de84
--- /dev/null
+++ b/data/osv/GO-2024-3294.json
@@ -0,0 +1,47 @@
+{
+ "schema_version": "1.3.1",
+ "id": "GO-2024-3294",
+ "modified": "0001-01-01T00:00:00Z",
+ "published": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "CVE-2024-53264"
+ ],
+ "summary": "Open Redirect Vulnerability in Loading Page in bunkerweb in github.com/bunkerity/bunkerweb",
+ "details": "Open Redirect Vulnerability in Loading Page in bunkerweb in github.com/bunkerity/bunkerweb",
+ "affected": [
+ {
+ "package": {
+ "name": "github.com/bunkerity/bunkerweb",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ },
+ {
+ "fixed": "1.5.11"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ }
+ ],
+ "references": [
+ {
+ "type": "ADVISORY",
+ "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53264"
+ },
+ {
+ "type": "WEB",
+ "url": "https://github.com/bunkerity/bunkerweb/security/advisories/GHSA-q9rr-h3hx-m87g"
+ }
+ ],
+ "database_specific": {
+ "url": "https://pkg.go.dev/vuln/GO-2024-3294",
+ "review_status": "UNREVIEWED"
+ }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2024-3296.json b/data/osv/GO-2024-3296.json
new file mode 100644
index 0000000..2e1395d
--- /dev/null
+++ b/data/osv/GO-2024-3296.json
@@ -0,0 +1,69 @@
+{
+ "schema_version": "1.3.1",
+ "id": "GO-2024-3296",
+ "modified": "0001-01-01T00:00:00Z",
+ "published": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "CVE-2024-53858",
+ "GHSA-jwcm-9g39-pmcw"
+ ],
+ "summary": "Recursive repository cloning can leak authentication tokens to non-GitHub submodule hosts in github.com/cli/cli",
+ "details": "Recursive repository cloning can leak authentication tokens to non-GitHub submodule hosts in github.com/cli/cli",
+ "affected": [
+ {
+ "package": {
+ "name": "github.com/cli/cli",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ },
+ {
+ "package": {
+ "name": "github.com/cli/cli/v2",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ },
+ {
+ "fixed": "2.63.0"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ }
+ ],
+ "references": [
+ {
+ "type": "ADVISORY",
+ "url": "https://github.com/cli/cli/security/advisories/GHSA-jwcm-9g39-pmcw"
+ },
+ {
+ "type": "ADVISORY",
+ "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53858"
+ },
+ {
+ "type": "WEB",
+ "url": "https://git-scm.com/docs/gitcredentials"
+ }
+ ],
+ "database_specific": {
+ "url": "https://pkg.go.dev/vuln/GO-2024-3296",
+ "review_status": "UNREVIEWED"
+ }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2024-3299.json b/data/osv/GO-2024-3299.json
new file mode 100644
index 0000000..0840622
--- /dev/null
+++ b/data/osv/GO-2024-3299.json
@@ -0,0 +1,97 @@
+{
+ "schema_version": "1.3.1",
+ "id": "GO-2024-3299",
+ "modified": "0001-01-01T00:00:00Z",
+ "published": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "CVE-2024-52003",
+ "GHSA-h924-8g65-j9wg"
+ ],
+ "summary": "Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik",
+ "details": "Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik",
+ "affected": [
+ {
+ "package": {
+ "name": "github.com/traefik/traefik",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ },
+ {
+ "package": {
+ "name": "github.com/traefik/traefik/v2",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ },
+ {
+ "fixed": "2.11.14"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ },
+ {
+ "package": {
+ "name": "github.com/traefik/traefik/v3",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ },
+ {
+ "fixed": "3.2.1"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ }
+ ],
+ "references": [
+ {
+ "type": "ADVISORY",
+ "url": "https://github.com/traefik/traefik/security/advisories/GHSA-h924-8g65-j9wg"
+ },
+ {
+ "type": "ADVISORY",
+ "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52003"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/traefik/traefik/pull/11253"
+ },
+ {
+ "type": "WEB",
+ "url": "https://github.com/traefik/traefik/releases/tag/v2.11.14"
+ },
+ {
+ "type": "WEB",
+ "url": "https://github.com/traefik/traefik/releases/tag/v3.2.1"
+ }
+ ],
+ "database_specific": {
+ "url": "https://pkg.go.dev/vuln/GO-2024-3299",
+ "review_status": "UNREVIEWED"
+ }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2024-3300.json b/data/osv/GO-2024-3300.json
new file mode 100644
index 0000000..2b48834
--- /dev/null
+++ b/data/osv/GO-2024-3300.json
@@ -0,0 +1,73 @@
+{
+ "schema_version": "1.3.1",
+ "id": "GO-2024-3300",
+ "modified": "0001-01-01T00:00:00Z",
+ "published": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "CVE-2024-52801",
+ "GHSA-6943-qr24-82vx"
+ ],
+ "summary": "sftpgo vulnerable to brute force takeover of OpenID Connect session cookies in github.com/drakkan/sftpgo",
+ "details": "sftpgo vulnerable to brute force takeover of OpenID Connect session cookies in github.com/drakkan/sftpgo",
+ "affected": [
+ {
+ "package": {
+ "name": "github.com/drakkan/sftpgo",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ },
+ {
+ "package": {
+ "name": "github.com/drakkan/sftpgo/v2",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "2.3.0"
+ },
+ {
+ "fixed": "2.6.4"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ }
+ ],
+ "references": [
+ {
+ "type": "ADVISORY",
+ "url": "https://github.com/drakkan/sftpgo/security/advisories/GHSA-6943-qr24-82vx"
+ },
+ {
+ "type": "ADVISORY",
+ "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52801"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/drakkan/sftpgo/commit/f30a9a2095bf90c0661b04fe038e3b7efc788bc6"
+ },
+ {
+ "type": "WEB",
+ "url": "https://github.com/rs/xid"
+ }
+ ],
+ "database_specific": {
+ "url": "https://pkg.go.dev/vuln/GO-2024-3300",
+ "review_status": "UNREVIEWED"
+ }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2024-3303.json b/data/osv/GO-2024-3303.json
new file mode 100644
index 0000000..6c36f51
--- /dev/null
+++ b/data/osv/GO-2024-3303.json
@@ -0,0 +1,91 @@
+{
+ "schema_version": "1.3.1",
+ "id": "GO-2024-3303",
+ "modified": "0001-01-01T00:00:00Z",
+ "published": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "CVE-2024-53862"
+ ],
+ "summary": "Argo Workflows Allows Access to Archived Workflows with Fake Token in `client` mode in github.com/argoproj/argo-workflows",
+ "details": "Argo Workflows Allows Access to Archived Workflows with Fake Token in `client` mode in github.com/argoproj/argo-workflows",
+ "affected": [
+ {
+ "package": {
+ "name": "github.com/argoproj/argo-workflows",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ },
+ {
+ "package": {
+ "name": "github.com/argoproj/argo-workflows/v2",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ },
+ {
+ "package": {
+ "name": "github.com/argoproj/argo-workflows/v3",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "3.5.7"
+ },
+ {
+ "fixed": "3.5.13"
+ },
+ {
+ "introduced": "3.6.0-rc1"
+ },
+ {
+ "fixed": "3.6.2"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ }
+ ],
+ "references": [
+ {
+ "type": "ADVISORY",
+ "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53862"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/argoproj/argo-workflows/pull/13021/files#diff-a5b255abaceddc9cc20bf6da6ae92c3a5d3605d94366af503ed754c079a1171aL668-R715"
+ },
+ {
+ "type": "WEB",
+ "url": "https://github.com/argoproj/argo-workflows/security/advisories/GHSA-h36c-m3rf-34h9"
+ }
+ ],
+ "database_specific": {
+ "url": "https://pkg.go.dev/vuln/GO-2024-3303",
+ "review_status": "UNREVIEWED"
+ }
+}
\ No newline at end of file
diff --git a/data/reports/GO-2024-3294.yaml b/data/reports/GO-2024-3294.yaml
new file mode 100644
index 0000000..8bdd359
--- /dev/null
+++ b/data/reports/GO-2024-3294.yaml
@@ -0,0 +1,16 @@
+id: GO-2024-3294
+modules:
+ - module: github.com/bunkerity/bunkerweb
+ versions:
+ - fixed: 1.5.11
+ vulnerable_at: 1.5.10
+summary: Open Redirect Vulnerability in Loading Page in bunkerweb in github.com/bunkerity/bunkerweb
+cves:
+ - CVE-2024-53264
+references:
+ - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-53264
+ - web: https://github.com/bunkerity/bunkerweb/security/advisories/GHSA-q9rr-h3hx-m87g
+source:
+ id: CVE-2024-53264
+ created: 2024-12-02T14:56:38.107508-05:00
+review_status: UNREVIEWED
diff --git a/data/reports/GO-2024-3296.yaml b/data/reports/GO-2024-3296.yaml
new file mode 100644
index 0000000..3913b65
--- /dev/null
+++ b/data/reports/GO-2024-3296.yaml
@@ -0,0 +1,23 @@
+id: GO-2024-3296
+modules:
+ - module: github.com/cli/cli
+ vulnerable_at: 1.14.0
+ - module: github.com/cli/cli/v2
+ versions:
+ - fixed: 2.63.0
+ vulnerable_at: 2.62.0
+summary: |-
+ Recursive repository cloning can leak authentication tokens to non-GitHub
+ submodule hosts in github.com/cli/cli
+cves:
+ - CVE-2024-53858
+ghsas:
+ - GHSA-jwcm-9g39-pmcw
+references:
+ - advisory: https://github.com/cli/cli/security/advisories/GHSA-jwcm-9g39-pmcw
+ - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-53858
+ - web: https://git-scm.com/docs/gitcredentials
+source:
+ id: GHSA-jwcm-9g39-pmcw
+ created: 2024-12-02T14:56:29.536126-05:00
+review_status: UNREVIEWED
diff --git a/data/reports/GO-2024-3299.yaml b/data/reports/GO-2024-3299.yaml
new file mode 100644
index 0000000..35f1be9
--- /dev/null
+++ b/data/reports/GO-2024-3299.yaml
@@ -0,0 +1,27 @@
+id: GO-2024-3299
+modules:
+ - module: github.com/traefik/traefik
+ vulnerable_at: 1.7.34
+ - module: github.com/traefik/traefik/v2
+ versions:
+ - fixed: 2.11.14
+ vulnerable_at: 2.11.13
+ - module: github.com/traefik/traefik/v3
+ versions:
+ - fixed: 3.2.1
+ vulnerable_at: 3.2.0
+summary: Traefik's X-Forwarded-Prefix Header still allows for Open Redirect in github.com/traefik/traefik
+cves:
+ - CVE-2024-52003
+ghsas:
+ - GHSA-h924-8g65-j9wg
+references:
+ - advisory: https://github.com/traefik/traefik/security/advisories/GHSA-h924-8g65-j9wg
+ - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-52003
+ - fix: https://github.com/traefik/traefik/pull/11253
+ - web: https://github.com/traefik/traefik/releases/tag/v2.11.14
+ - web: https://github.com/traefik/traefik/releases/tag/v3.2.1
+source:
+ id: GHSA-h924-8g65-j9wg
+ created: 2024-12-02T14:56:24.090371-05:00
+review_status: UNREVIEWED
diff --git a/data/reports/GO-2024-3300.yaml b/data/reports/GO-2024-3300.yaml
new file mode 100644
index 0000000..2e43eab
--- /dev/null
+++ b/data/reports/GO-2024-3300.yaml
@@ -0,0 +1,23 @@
+id: GO-2024-3300
+modules:
+ - module: github.com/drakkan/sftpgo
+ vulnerable_at: 1.2.2
+ - module: github.com/drakkan/sftpgo/v2
+ versions:
+ - introduced: 2.3.0
+ - fixed: 2.6.4
+ vulnerable_at: 2.6.3
+summary: sftpgo vulnerable to brute force takeover of OpenID Connect session cookies in github.com/drakkan/sftpgo
+cves:
+ - CVE-2024-52801
+ghsas:
+ - GHSA-6943-qr24-82vx
+references:
+ - advisory: https://github.com/drakkan/sftpgo/security/advisories/GHSA-6943-qr24-82vx
+ - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-52801
+ - fix: https://github.com/drakkan/sftpgo/commit/f30a9a2095bf90c0661b04fe038e3b7efc788bc6
+ - web: https://github.com/rs/xid
+source:
+ id: GHSA-6943-qr24-82vx
+ created: 2024-12-02T14:56:19.561793-05:00
+review_status: UNREVIEWED
diff --git a/data/reports/GO-2024-3303.yaml b/data/reports/GO-2024-3303.yaml
new file mode 100644
index 0000000..d1b5bde
--- /dev/null
+++ b/data/reports/GO-2024-3303.yaml
@@ -0,0 +1,26 @@
+id: GO-2024-3303
+modules:
+ - module: github.com/argoproj/argo-workflows
+ vulnerable_at: 0.4.7
+ - module: github.com/argoproj/argo-workflows/v2
+ vulnerable_at: 2.12.13
+ - module: github.com/argoproj/argo-workflows/v3
+ versions:
+ - introduced: 3.5.7
+ - fixed: 3.5.13
+ - introduced: 3.6.0-rc1
+ - fixed: 3.6.2
+ vulnerable_at: 3.6.1
+summary: |-
+ Argo Workflows Allows Access to Archived Workflows with Fake Token in `client`
+ mode in github.com/argoproj/argo-workflows
+cves:
+ - CVE-2024-53862
+references:
+ - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-53862
+ - fix: https://github.com/argoproj/argo-workflows/pull/13021/files#diff-a5b255abaceddc9cc20bf6da6ae92c3a5d3605d94366af503ed754c079a1171aL668-R715
+ - web: https://github.com/argoproj/argo-workflows/security/advisories/GHSA-h36c-m3rf-34h9
+source:
+ id: CVE-2024-53862
+ created: 2024-12-02T14:56:09.920859-05:00
+review_status: UNREVIEWED