CVE-2023-45286 — Race Condition in Go-resty Resty V2 Github.com Go-resty Resty V2
Severity
5.9MEDIUMNVD
EPSS
0.4%
top 36.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 28
Description
A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending …
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6
Affected Packages5 packages
Patches
🔴Vulnerability Details
4OSV▶
CVE-2023-45286: A race condition in go-resty can result in HTTP request body disclosure across requests↗2023-11-28
📋Vendor Advisories
3Debian▶
CVE-2023-45286: golang-github-go-resty-resty - A race condition in go-resty can result in HTTP request body disclosure across r...↗2023