Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-45285

Опубликовано: 06 дек. 2023
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Using go get to fetch a module with the ".git" suffix may unexpectedly fallback to the insecure "git://" protocol if the module is unavailable via the secure "https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off).

A flaw was found in the Golang package cmd/go. This issue permits the fallback to insecure "git://" if trying to fetch a .git module that has no "https://" or "git+ssh://" available.

Отчет

Red Hat rates this issue as Moderate, as the default configuration avoids this behavior, mitigating the vulnerability.

Меры по смягчению последствий

This issue only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off). In order to mitigate this, keep GOPROXY with default values and use a module proxy. This vulnerability is not explored with default GOPROXY value.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 2openshift-golang-builder-containerNot affected
Red Hat OpenShift Virtualization 4openshift-golang-builder-containerAffected
Red Hat Storage 3golangAffected
Red Hat Developer Toolsgo-toolset-1.19-golangFixedRHSA-2024:104129.02.2024
Red Hat Enterprise Linux 8go-toolsetFixedRHSA-2024:088720.02.2024
Red Hat Enterprise Linux 9golangFixedRHSA-2024:113105.03.2024
Red Hat OpenShift Container Platform 4.15openshift4/cloud-network-config-controller-rhel8FixedRHSA-2023:719827.02.2024
Red Hat OpenShift Container Platform 4.15openshift4/egress-router-cni-rhel8FixedRHSA-2023:719827.02.2024
Red Hat OpenShift Container Platform 4.15openshift4/kube-metrics-server-rhel8FixedRHSA-2023:719827.02.2024
Red Hat OpenShift Container Platform 4.15openshift4/kubevirt-csi-driver-rhel8FixedRHSA-2023:719827.02.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-693
https://bugzilla.redhat.com/show_bug.cgi?id=2253323golang: cmd/go: Protocol Fallback when fetching modules

EPSS

Процентиль: 17%
0.00055
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

Using go get to fetch a module with the ".git" suffix may unexpectedly fallback to the insecure "git://" protocol if the module is unavailable via the secure "https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off).

CVSS3: 7.5
nvd
больше 1 года назад

Using go get to fetch a module with the ".git" suffix may unexpectedly fallback to the insecure "git://" protocol if the module is unavailable via the secure "https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off).

CVSS3: 7.5
debian
больше 1 года назад

Using go get to fetch a module with the ".git" suffix may unexpectedly ...

CVSS3: 7.5
github
больше 1 года назад

Using go get to fetch a module with the ".git" suffix may unexpectedly fallback to the insecure "git://" protocol if the module is unavailable via the secure "https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off).

CVSS3: 7.5
fstec
больше 1 года назад

Уязвимость компонента cmd-go языка программирования Go, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 17%
0.00055
Низкий

7.5 High

CVSS3