CVE-2022-1996 — Authorization Bypass Through User-Controlled Key in Go-restful
CWE-639 — Authorization Bypass Through User-Controlled KeyCWE-1341 — Multiple Releases of Same Resource or HandleCWE-825 — Expired Pointer DereferenceCWE-20 — Improper Input ValidationCWE-430 — Deployment of Wrong HandlerCWE-362 — Race ConditionCWE-476 — NULL Pointer DereferenceCWE-416 — Use After FreeCWE-787 — Out-of-bounds WriteCWE-544 — Missing Standardized Error Handling MechanismCWE-826 — Premature Release of Resource During Expected LifetimeCWE-823 — Use of Out-of-range Pointer Offset35 documents7 sources
Severity
9.1CRITICALNVD
EPSS
1.0%
top 23.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 8
Latest updateDec 24
Description
Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3.8.0.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 3.9 | Impact: 5.2
Affected Packages13 packages
▶debiandebian/golang-github-emicklei-go-restful< golang-github-emicklei-go-restful 3.10.2-1 (bookworm)
Also affects: Fedora 35, 36
Patches
🔴Vulnerability Details
5OSV
▶
OSV▶
CVE-2022-1996: Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3↗2022-06-08