зеркало из https://github.com/golang/vulndb.git
data/reports: add GO-2023-1600.yaml
Aliases: CVE-2023-26047, GHSA-p2pf-g8cq-3gq5 Fixes golang/vulndb#1600 Change-Id: I0d3fa1f1ee4eed4f4ccd9515afd53b37545bbc06 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/472735 Run-TryBot: Zvonimir Pavlinovic <zpavlinovic@google.com> TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Damien Neil <dneil@google.com>
This commit is contained in:
Родитель
4077696fe1
Коммит
0310a8784e
|
@ -0,0 +1,61 @@
|
|||
{
|
||||
"id": "GO-2023-1600",
|
||||
"published": "0001-01-01T00:00:00Z",
|
||||
"modified": "0001-01-01T00:00:00Z",
|
||||
"aliases": [
|
||||
"CVE-2023-26047",
|
||||
"GHSA-p2pf-g8cq-3gq5"
|
||||
],
|
||||
"details": "Improper handling of payload with special characters, such as CR/LF and horizontal tab, can lead to execution of arbitrary JavaScript code.",
|
||||
"affected": [
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/kitabisa/teler-waf",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
},
|
||||
{
|
||||
"fixed": "0.2.0"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"database_specific": {
|
||||
"url": "https://pkg.go.dev/vuln/GO-2023-1600"
|
||||
},
|
||||
"ecosystem_specific": {
|
||||
"imports": [
|
||||
{
|
||||
"path": "github.com/kitabisa/teler-waf",
|
||||
"symbols": [
|
||||
"Teler.Analyze",
|
||||
"Teler.HandlerFuncWithNext",
|
||||
"Teler.checkCommonWebAttack"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://github.com/advisories/GHSA-p2pf-g8cq-3gq5"
|
||||
},
|
||||
{
|
||||
"type": "FIX",
|
||||
"url": "https://github.com/kitabisa/teler-waf/commit/6e1b0e19b8adc1bbc3513a986025d4adf88d59f8"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://github.com/kitabisa/teler-waf/releases/tag/v0.2.0"
|
||||
}
|
||||
],
|
||||
"schema_version": "1.3.1"
|
||||
}
|
|
@ -0,0 +1,23 @@
|
|||
modules:
|
||||
- module: github.com/kitabisa/teler-waf
|
||||
versions:
|
||||
- fixed: 0.2.0
|
||||
vulnerable_at: 0.1.2
|
||||
packages:
|
||||
- package: github.com/kitabisa/teler-waf
|
||||
symbols:
|
||||
- Teler.checkCommonWebAttack
|
||||
derived_symbols:
|
||||
- Teler.Analyze
|
||||
- Teler.HandlerFuncWithNext
|
||||
description: |-
|
||||
Improper handling of payload with special characters, such as CR/LF and horizontal tab,
|
||||
can lead to execution of arbitrary JavaScript code.
|
||||
cves:
|
||||
- CVE-2023-26047
|
||||
ghsas:
|
||||
- GHSA-p2pf-g8cq-3gq5
|
||||
references:
|
||||
- advisory: https://github.com/advisories/GHSA-p2pf-g8cq-3gq5
|
||||
- fix: https://github.com/kitabisa/teler-waf/commit/6e1b0e19b8adc1bbc3513a986025d4adf88d59f8
|
||||
- web: https://github.com/kitabisa/teler-waf/releases/tag/v0.2.0
|
Загрузка…
Ссылка в новой задаче