Golang Go vulnerabilities

142 known vulnerabilities affecting golang/go.

Total CVEs
142
CISA KEV
2
actively exploited
Public exploits
2
Exploited in wild
2
Severity breakdown
CRITICAL17HIGH84MEDIUM39LOW2

Vulnerabilities

Page 3 of 8
CVE-2023-29405CRITICALCVSS 9.8fixed in 1.19.10≥ 1.20.0, < 1.20.52023-06-08
CVE-2023-29405 [CRITICAL] CWE-74 CVE-2023-29405: The go command may execute arbitrary code at build time when using cgo. This may occur when running The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed fla
nvd
CVE-2023-29403HIGHCVSS 7.8fixed in 1.19.10≥ 1.20.0, < 1.20.52023-06-08
CVE-2023-29403 [HIGH] CWE-668 CVE-2023-29403: On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/s On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result
nvd
CVE-2023-24540CRITICALCVSS 9.8fixed in 1.19.9≥ 1.20.0, < 1.20.42023-05-11
CVE-2023-24540 [CRITICAL] CWE-77 CVE-2023-24540: Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.
nvd
CVE-2023-24539HIGHCVSS 7.3fixed in 1.19.9≥ 1.20.0, < 1.20.42023-05-11
CVE-2023-24539 [HIGH] CWE-74 CVE-2023-24539: Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templat Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpected HTML, if executed with untrusted input.
nvd
CVE-2023-29400HIGHCVSS 7.3fixed in 1.19.9≥ 1.20.0, < 1.20.42023-05-11
CVE-2023-29400 [HIGH] CWE-74 CVE-2023-29400: Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty inp Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.
nvd
CVE-2023-24538CRITICALCVSS 9.8fixed in 1.19.8≥ 1.20.0, < 1.20.32023-04-06
CVE-2023-24538 [CRITICAL] CWE-94 CVE-2023-24538: Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascrip
nvd
CVE-2023-24534HIGHCVSS 7.5fixed in 1.19.8≥ 1.20.0, < 1.20.32023-04-06
CVE-2023-24534 [HIGH] CWE-400 CVE-2023-24534: HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, p HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit t
nvd
CVE-2023-24537HIGHCVSS 7.5fixed in 1.19.8≥ 1.20.0, < 1.20.32023-04-06
CVE-2023-24537 [HIGH] CWE-190 CVE-2023-24537: Calling any of the Parse functions on Go source code which contains //line directives with very larg Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow.
nvd
CVE-2023-24536HIGHCVSS 7.5fixed in 1.19.8≥ 1.20.0, < 1.20.32023-04-06
CVE-2023-24536 [HIGH] CWE-770 CVE-2023-24536: Multipart form parsing can consume large amounts of CPU and memory when processing form inputs conta Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can undercount the amount of memory consumed, leading it to accept larger inputs t
nvd
CVE-2023-24532MEDIUMCVSS 5.3fixed in 1.19.7≥ 1.20.0, < 1.20.22023-03-08
CVE-2023-24532 [MEDIUM] CWE-682 CVE-2023-24532: The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (a scalar larger than the order of the curve). This does not impact usages of crypto/ecdsa or crypto/ecdh.
nvd
CVE-2022-41723HIGHCVSS 7.5fixed in 1.19.6v1.20.02023-02-28
CVE-2022-41723 [HIGH] CWE-400 CVE-2022-41723: A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, suff A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.
nvd
CVE-2022-41724HIGHCVSS 7.5fixed in 1.19.6v1.20.02023-02-28
CVE-2022-41724 [HIGH] CWE-400 CVE-2022-41724: Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-
nvd
CVE-2022-41725HIGHCVSS 7.5fixed in 1.19.6v1.20.02023-02-28
CVE-2022-41725 [HIGH] CWE-770 CVE-2022-41725: A denial of service is possible from excessive resource consumption in net/http and mime/multipart. A denial of service is possible from excessive resource consumption in net/http and mime/multipart. Multipart form parsing with mime/multipart.Reader.ReadForm can consume largely unlimited amounts of memory and disk files. This also affects form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFo
nvd
CVE-2022-41722HIGHCVSS 7.5fixed in 1.19.6v1.20.02023-02-28
CVE-2022-41722 [HIGH] CWE-22 CVE-2022-41722: A path traversal vulnerability exists in filepath.Clean on Windows. On Windows, the filepath.Clean f A path traversal vulnerability exists in filepath.Clean on Windows. On Windows, the filepath.Clean function could transform an invalid path such as "a/../c:/b" into the valid path "c:\b". This transformation of a relative (if invalid) path into an absolute path could enable a directory traversal attack. After fix, the filepath.Clean function transforms
nvd
CVE-2022-41717MEDIUMCVSS 5.3fixed in 1.18.9≥ 1.19.0, < 1.19.42022-12-08
CVE-2022-41717 [MEDIUM] CWE-770 CVE-2022-41717: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 serve An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.
nvd
CVE-2022-41720HIGHCVSS 7.5fixed in 1.18.9≥ 1.19.0, < 1.19.42022-12-07
CVE-2022-41720 [HIGH] CWE-22 CVE-2022-41720: On Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and ht On Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted at a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS("C:/tmp").Open("COM1") opens the COM1 device. Both os.DirFS and http.Dir only provide
nvd
CVE-2022-41716HIGHCVSS 7.5fixed in 1.18.8≥ 1.19.0, < 1.19.32022-11-02
CVE-2022-41716 [HIGH] CVE-2022-41716: Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Win Due to unsanitized NUL values, attackers may be able to maliciously set environment variables on Windows. In syscall.StartProcess and os/exec.Cmd, invalid environment variable values containing NUL values are not properly checked for. A malicious environment variable value can exploit this behavior to set a value for a different environment variable. For exam
nvd
CVE-2022-2879HIGHCVSS 7.5fixed in 1.18.7≥ 1.19.0, < 1.19.22022-10-14
CVE-2022-2879 [HIGH] CWE-770 CVE-2022-2879: Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB.
nvd
CVE-2022-2880HIGHCVSS 7.5fixed in 1.18.7≥ 1.19.0, < 1.19.22022-10-14
CVE-2022-2880 [HIGH] CWE-444 CVE-2022-2880: Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, includ Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparsable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparsable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound requ
nvd
CVE-2022-41715HIGHCVSS 7.5fixed in 1.18.7≥ 1.19.0, < 1.19.22022-10-14
CVE-2022-41715 [HIGH] CVE-2022-41715: Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaus Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being p
nvd