CVE-2023-45286Race Condition in Go-resty Resty V2 Github.com Go-resty Resty V2

Severity
5.9MEDIUMNVD
EPSS
0.4%
top 36.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 28

Description

A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6

Affected Packages5 packages

Gogithub.com/go-resty_resty_v22.10.02.11.0
debiandebian/golang-github-go-resty-resty< golang-github-go-resty-resty 2.10.0-2 (forky)

Patches

🔴Vulnerability Details

4
OSV
github.com/go-resty/resty/v2 HTTP request body disclosure2023-11-28
GHSA
github.com/go-resty/resty/v2 HTTP request body disclosure2023-11-28
OSV
CVE-2023-45286: A race condition in go-resty can result in HTTP request body disclosure across requests2023-11-28
OSV
HTTP request body disclosure in github.com/go-resty/resty/v22023-11-27

📋Vendor Advisories

3
Red Hat
go-resty: HTTP request body disclosure in github.com/go-resty/resty/v22023-11-28
Microsoft
HTTP request body disclosure in github.com/go-resty/resty/v22023-11-14
Debian
CVE-2023-45286: golang-github-go-resty-resty - A race condition in go-resty can result in HTTP request body disclosure across r...2023