зеркало из https://github.com/golang/vulndb.git
data/reports: add GO-2023-1515.yaml
Aliases: CVE-2022-43756, GHSA-8fcj-gf77-47mg Fixes golang/vulndb#1515 Change-Id: Ie12b030b8859156a869cb91050fd9af7ab8daf05 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/466665 Run-TryBot: Maceo Thompson <maceothompson@google.com> TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Tatiana Bradley <tatianabradley@google.com>
This commit is contained in:
Родитель
18450b1d4c
Коммит
e2b43878b0
|
@ -0,0 +1,81 @@
|
|||
{
|
||||
"id": "GO-2023-1515",
|
||||
"published": "0001-01-01T00:00:00Z",
|
||||
"modified": "0001-01-01T00:00:00Z",
|
||||
"aliases": [
|
||||
"CVE-2022-43756",
|
||||
"GHSA-8fcj-gf77-47mg"
|
||||
],
|
||||
"details": "A denial of service (DoS) vulnerability exists in the Wrangler Git package. Specially crafted Git credentials can result in a denial of service (DoS) attack on an application that uses Wrangler due to the exhaustion of the available memory and CPU resources.\n\nThis is caused by a lack of input validation of Git credentials before they are used, which may lead to a denial of service in some cases. This issue can be triggered when accessing both private and public Git repositories.\n\nA workaround is to sanitize input passed to the Git package to remove potential unsafe and ambiguous characters. Otherwise, the best course of action is to update to a patched Wrangler version.",
|
||||
"affected": [
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/rancher/wrangler",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0.8.6"
|
||||
},
|
||||
{
|
||||
"fixed": "0.8.11"
|
||||
},
|
||||
{
|
||||
"introduced": "1.0.0"
|
||||
},
|
||||
{
|
||||
"fixed": "1.0.1"
|
||||
},
|
||||
{
|
||||
"introduced": "0.8.0"
|
||||
},
|
||||
{
|
||||
"fixed": "0.8.5-security1"
|
||||
},
|
||||
{
|
||||
"fixed": "0.7.4-security1"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"database_specific": {
|
||||
"url": "https://pkg.go.dev/vuln/GO-2023-1515"
|
||||
},
|
||||
"ecosystem_specific": {
|
||||
"imports": [
|
||||
{
|
||||
"path": "github.com/rancher/wrangler/pkg/git",
|
||||
"symbols": [
|
||||
"Git.Clone",
|
||||
"Git.Ensure",
|
||||
"Git.Head",
|
||||
"Git.LsRemote",
|
||||
"Git.Update",
|
||||
"Git.fetchAndReset",
|
||||
"Git.gitCmd",
|
||||
"Git.reset"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"type": "FIX",
|
||||
"url": "https://github.com/rancher/wrangler/commit/341018c8fef3e12867c7cb2649bd2cecac75f287"
|
||||
},
|
||||
{
|
||||
"type": "ADVISORY",
|
||||
"url": "https://github.com/advisories/GHSA-8fcj-gf77-47mg"
|
||||
},
|
||||
{
|
||||
"type": "WEB",
|
||||
"url": "https://github.com/rancher/rancher/security/policy"
|
||||
}
|
||||
],
|
||||
"schema_version": "1.3.1"
|
||||
}
|
|
@ -0,0 +1,44 @@
|
|||
modules:
|
||||
- module: github.com/rancher/wrangler
|
||||
versions:
|
||||
- introduced: 0.8.6
|
||||
fixed: 0.8.11
|
||||
- introduced: 1.0.0
|
||||
fixed: 1.0.1
|
||||
- introduced: 0.8.0
|
||||
fixed: 0.8.5-security1
|
||||
- fixed: 0.7.4-security1
|
||||
vulnerable_at: 1.0.0
|
||||
packages:
|
||||
- package: github.com/rancher/wrangler/pkg/git
|
||||
symbols:
|
||||
- Git.Clone
|
||||
- Git.fetchAndReset
|
||||
- Git.reset
|
||||
- Git.gitCmd
|
||||
derived_symbols:
|
||||
- Git.Ensure
|
||||
- Git.Head
|
||||
- Git.LsRemote
|
||||
- Git.Update
|
||||
description: |
|
||||
A denial of service (DoS) vulnerability exists in the Wrangler Git package.
|
||||
Specially crafted Git credentials can result in a denial of service (DoS) attack
|
||||
on an application that uses Wrangler due to the exhaustion of the available memory
|
||||
and CPU resources.
|
||||
|
||||
This is caused by a lack of input validation of Git credentials before they are
|
||||
used, which may lead to a denial of service in some cases. This issue can be
|
||||
triggered when accessing both private and public Git repositories.
|
||||
|
||||
A workaround is to sanitize input passed to the Git package to remove potential
|
||||
unsafe and ambiguous characters. Otherwise, the best course of action is to update
|
||||
to a patched Wrangler version.
|
||||
cves:
|
||||
- CVE-2022-43756
|
||||
ghsas:
|
||||
- GHSA-8fcj-gf77-47mg
|
||||
references:
|
||||
- fix: https://github.com/rancher/wrangler/commit/341018c8fef3e12867c7cb2649bd2cecac75f287
|
||||
- advisory: https://github.com/advisories/GHSA-8fcj-gf77-47mg
|
||||
- web: https://github.com/rancher/rancher/security/policy
|
Загрузка…
Ссылка в новой задаче