data/reports: add GO-2023-1600.yaml

Aliases: CVE-2023-26047, GHSA-p2pf-g8cq-3gq5

Fixes golang/vulndb#1600

Change-Id: I0d3fa1f1ee4eed4f4ccd9515afd53b37545bbc06
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/472735
Run-TryBot: Zvonimir Pavlinovic <zpavlinovic@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Damien Neil <dneil@google.com>
This commit is contained in:
Zvonimir Pavlinovic 2023-03-01 15:42:37 -08:00
Родитель 4077696fe1
Коммит 0310a8784e
2 изменённых файлов: 84 добавлений и 0 удалений

Просмотреть файл

@ -0,0 +1,61 @@
{
"id": "GO-2023-1600",
"published": "0001-01-01T00:00:00Z",
"modified": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-26047",
"GHSA-p2pf-g8cq-3gq5"
],
"details": "Improper handling of payload with special characters, such as CR/LF and horizontal tab, can lead to execution of arbitrary JavaScript code.",
"affected": [
{
"package": {
"name": "github.com/kitabisa/teler-waf",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.2.0"
}
]
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1600"
},
"ecosystem_specific": {
"imports": [
{
"path": "github.com/kitabisa/teler-waf",
"symbols": [
"Teler.Analyze",
"Teler.HandlerFuncWithNext",
"Teler.checkCommonWebAttack"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-p2pf-g8cq-3gq5"
},
{
"type": "FIX",
"url": "https://github.com/kitabisa/teler-waf/commit/6e1b0e19b8adc1bbc3513a986025d4adf88d59f8"
},
{
"type": "WEB",
"url": "https://github.com/kitabisa/teler-waf/releases/tag/v0.2.0"
}
],
"schema_version": "1.3.1"
}

Просмотреть файл

@ -0,0 +1,23 @@
modules:
- module: github.com/kitabisa/teler-waf
versions:
- fixed: 0.2.0
vulnerable_at: 0.1.2
packages:
- package: github.com/kitabisa/teler-waf
symbols:
- Teler.checkCommonWebAttack
derived_symbols:
- Teler.Analyze
- Teler.HandlerFuncWithNext
description: |-
Improper handling of payload with special characters, such as CR/LF and horizontal tab,
can lead to execution of arbitrary JavaScript code.
cves:
- CVE-2023-26047
ghsas:
- GHSA-p2pf-g8cq-3gq5
references:
- advisory: https://github.com/advisories/GHSA-p2pf-g8cq-3gq5
- fix: https://github.com/kitabisa/teler-waf/commit/6e1b0e19b8adc1bbc3513a986025d4adf88d59f8
- web: https://github.com/kitabisa/teler-waf/releases/tag/v0.2.0