- data/reports/GO-2024-2812.yaml
  - data/reports/GO-2024-2813.yaml

Fixes golang/vulndb#2812
Fixes golang/vulndb#2813
Fixes golang/vulndb#2807
Fixes golang/vulndb#2806

Change-Id: Idf3f1c1ae112152dfe7967bb349f9dc9fa10b517
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/586140
Reviewed-by: Zvonimir Pavlinovic <zpavlinovic@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
This commit is contained in:
Tatiana Bradley 2024-05-20 17:00:19 -04:00
Родитель d6b9156019
Коммит b22fdb071d
4 изменённых файлов: 192 добавлений и 0 удалений

Просмотреть файл

@ -0,0 +1,64 @@
{
"schema_version": "1.3.1",
"id": "GO-2024-2812",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"GHSA-v84h-653v-4pq9"
],
"related": [
"GHSA-vhxv-fg4m-p2w8"
],
"summary": "Some CORS middleware allow untrusted origins in github.com/jub0bs/fcors",
"details": "Some CORS middleware (more specifically those created by specifying two or more origin patterns whose hosts share a proper suffix) incorrectly allow some untrusted origins, thereby opening the door to cross-origin attacks from the untrusted origins in question.\n\nFor example, specifying origin patterns \"https://foo.com\" and \"https://bar.com\" (in that order) would yield a middleware that would incorrectly allow untrusted origin \"https://barfoo.com\".",
"affected": [
{
"package": {
"name": "github.com/jub0bs/fcors",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.9.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/jub0bs/fcors/internal/radix",
"symbols": [
"Tree.Contains",
"Tree.Insert",
"lastByteIn",
"lengthOfCommonSuffix",
"node.add",
"splitRight"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/jub0bs/fcors/security/advisories/GHSA-v84h-653v-4pq9"
},
{
"type": "FIX",
"url": "https://github.com/jub0bs/fcors/commit/b5dcb889a49def37d7d9c25deb7135f4eb45625e"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2812",
"review_status": "REVIEWED"
}
}

Просмотреть файл

@ -0,0 +1,60 @@
{
"schema_version": "1.3.1",
"id": "GO-2024-2813",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"GHSA-vhxv-fg4m-p2w8"
],
"related": [
"GHSA-v84h-653v-4pq9"
],
"summary": "Some CORS middleware allow untrusted origins in github.com/jub0bs/cors",
"details": "Some CORS middleware (more specifically those created by specifying two or more origin patterns whose hosts share a proper suffix) incorrectly allow some untrusted origins, thereby opening the door to cross-origin attacks from the untrusted origins in question.\n\nFor example, specifying origin patterns \"https://foo.com\" and \"https://bar.com\" (in that order) would yield a middleware that would incorrectly allow untrusted origin \"https://barfoo.com\".",
"affected": [
{
"package": {
"name": "github.com/jub0bs/cors",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.1.3"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/jub0bs/cors/internal/origins/radix",
"symbols": [
"Tree.Contains",
"Tree.Insert"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/jub0bs/cors/security/advisories/GHSA-vhxv-fg4m-p2w8"
},
{
"type": "FIX",
"url": "https://github.com/jub0bs/cors/commit/63900fa1776237095fa0ed47ff85791e21f3a7d7"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-2813",
"review_status": "REVIEWED"
}
}

Просмотреть файл

@ -0,0 +1,36 @@
id: GO-2024-2812
modules:
- module: github.com/jub0bs/fcors
versions:
- fixed: 0.9.0
vulnerable_at: 0.8.0
packages:
- package: github.com/jub0bs/fcors/internal/radix
symbols:
- splitRight
- Tree.Insert
- node.add
- lengthOfCommonSuffix
- lastByteIn
- Tree.Contains
summary: Some CORS middleware allow untrusted origins in github.com/jub0bs/fcors
description: |-
Some CORS middleware (more specifically those created by specifying two or more
origin patterns whose hosts share a proper suffix) incorrectly allow some
untrusted origins, thereby opening the door to cross-origin attacks from the
untrusted origins in question.
For example, specifying origin patterns "https://foo.com" and "https://bar.com"
(in that order) would yield a middleware that would incorrectly allow untrusted
origin "https://barfoo.com".
ghsas:
- GHSA-v84h-653v-4pq9
related:
- GHSA-vhxv-fg4m-p2w8
references:
- advisory: https://github.com/jub0bs/fcors/security/advisories/GHSA-v84h-653v-4pq9
- fix: https://github.com/jub0bs/fcors/commit/b5dcb889a49def37d7d9c25deb7135f4eb45625e
source:
id: GHSA-v84h-653v-4pq9
created: 2024-05-20T16:46:53.091159-04:00
review_status: REVIEWED

Просмотреть файл

@ -0,0 +1,32 @@
id: GO-2024-2813
modules:
- module: github.com/jub0bs/cors
versions:
- fixed: 0.1.3
vulnerable_at: 0.1.2
packages:
- package: github.com/jub0bs/cors/internal/origins/radix
symbols:
- Tree.Contains
- Tree.Insert
summary: Some CORS middleware allow untrusted origins in github.com/jub0bs/cors
description: |-
Some CORS middleware (more specifically those created by specifying two or more
origin patterns whose hosts share a proper suffix) incorrectly allow some
untrusted origins, thereby opening the door to cross-origin attacks from the
untrusted origins in question.
For example, specifying origin patterns "https://foo.com" and "https://bar.com"
(in that order) would yield a middleware that would incorrectly allow untrusted
origin "https://barfoo.com".
ghsas:
- GHSA-vhxv-fg4m-p2w8
related:
- GHSA-v84h-653v-4pq9
references:
- advisory: https://github.com/jub0bs/cors/security/advisories/GHSA-vhxv-fg4m-p2w8
- fix: https://github.com/jub0bs/cors/commit/63900fa1776237095fa0ed47ff85791e21f3a7d7
source:
id: GHSA-vhxv-fg4m-p2w8
created: 2024-05-20T16:46:53.79904-04:00
review_status: REVIEWED