Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-24540

Опубликовано: 20 апр. 2023
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.

A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.

Отчет

For Red Hat Enterprise Linux,

  • Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, hence, not in the actual code, thus, conmon is not affected.
  • The Go templates in Grafana do not contain any javascript. Thus, it is not affected.
  • Ignition does not make use of html/template. In Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable golang html/templates to authenticated users only, therefore the impact is low.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Custom Metric Autoscaler operator for Red Hat Openshiftcustom-metrics-autoscaler/custom-metrics-autoscaler-rhel8Affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-loki-rhel8Not affected
Migration Toolkit for Virtualizationmigration-toolkit-virtualization/mtv-rhel8-operatorAffected
OpenShift Developer Tools and ServiceshelmAffected
OpenShift Developer Tools and ServicesodoAffected
OpenShift Pipelinesopenshift-pipelines-clientAffected
OpenShift Secondary Scheduler Operatoropenshift-secondary-scheduler-operator/secondary-scheduler-rhel9-operatorNot affected
OpenShift Serverlessopenshift-serverless-1/client-kn-rhel8Affected
Red Hat 3scale API Management Platform 23scale-operator-containerAffected
Red Hat AMQ Broker 7amq-broker-rhel8-operator-containerAffected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-176
https://bugzilla.redhat.com/show_bug.cgi?id=2196027golang: html/template: improper handling of JavaScript whitespace

EPSS

Процентиль: 48%
0.00243
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 2 лет назад

Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.

CVSS3: 9.8
nvd
около 2 лет назад

Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.

CVSS3: 9.8
debian
около 2 лет назад

Not all valid JavaScript whitespace characters are considered to be wh ...

CVSS3: 9.8
github
около 2 лет назад

Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.

oracle-oval
около 2 лет назад

ELSA-2023-3319: go-toolset:ol8 security update (IMPORTANT)

EPSS

Процентиль: 48%
0.00243
Низкий

8.1 High

CVSS3