CVE-2024-24785
Published: March 7, 2024Last modified: March 7, 2024
Description
If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.4 |
Attack Vector | NETWORK |
Attack complexity | LOW |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | LOW |
Integrity impact | LOW |
Availability impact | NONE |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | go | Fixed (1.21.8-r0) |
Stream | go | Fixed (1.22.1-r0) |
References
- http://www.openwall.com/lists/oss-security/2024/03/08/4
- https://go.dev/cl/564196
- https://go.dev/issue/65697
- https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg
- https://pkg.go.dev/vuln/GO-2024-2610
- https://security.netapp.com/advisory/ntap-20240329-0008/