We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Advisory GHSA-32gq-x56h-299c references a vulnerability in the following Go modules:
Description: A plugin name containing a path separator may allow an attacker to execute an arbitrary binary.
Such a plugin name can be provided to the age CLI through an attacker-controlled recipient or identity string, or to the plugin.NewIdentity, plugin.NewIdentityWithoutData, or plugin.NewRecipient APIs.
plugin.NewIdentity
plugin.NewIdentityWithoutData
plugin.NewRecipient
On UNIX systems, a directory matching ${TMPDIR:-/tmp}/age-plugin-* needs to exist for the attack to succeed.
${TMPDIR:-/tmp}/age-plugin-*
The...
References:
No existing reports found with this module or alias. See doc/quickstart.md for instructions on how to triage this report.
id: GO-ID-PENDING modules: - module: filippo.io/age versions: - fixed: 1.2.1 vulnerable_at: 1.2.0 summary: |- age vulnerable to malicious plugin names, recipients, or identities causing arbitrary binary execution in filippo.io/age ghsas: - GHSA-32gq-x56h-299c references: - advisory: https://github.com/FiloSottile/age/security/advisories/GHSA-32gq-x56h-299c - advisory: https://github.com/advisories/GHSA-32gq-x56h-299c - fix: https://github.com/FiloSottile/age/commit/482cf6fc9babd3ab06f6606762aac10447222201 source: id: GHSA-32gq-x56h-299c created: 2024-12-18T19:01:24.677926801Z review_status: UNREVIEWED
The text was updated successfully, but these errors were encountered:
Change https://go.dev/cl/638117 mentions this issue: data/reports: add needs review GO-2024-3344
data/reports: add needs review GO-2024-3344
Sorry, something went wrong.
Change https://go.dev/cl/637957 mentions this issue: data/reports: add 2 needs review reports
data/reports: add 2 needs review reports
Change https://go.dev/cl/637960 mentions this issue: data/reports: review GO-2024-3344
data/reports: review GO-2024-3344
3ff7d8e
- data/reports/GO-2024-3101.yaml - data/reports/GO-2024-3344.yaml Updates #3101 Updates #3344 Change-Id: I2f7e53dcc3408324888151bf28d19d6e2d950fba Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/637957 LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Reviewed-by: Damien Neil <dneil@google.com> Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
1de53ca
No branches or pull requests
Advisory GHSA-32gq-x56h-299c references a vulnerability in the following Go modules:
Description:
A plugin name containing a path separator may allow an attacker to execute an arbitrary binary.
Such a plugin name can be provided to the age CLI through an attacker-controlled recipient or identity string, or to the
plugin.NewIdentity
,plugin.NewIdentityWithoutData
, orplugin.NewRecipient
APIs.On UNIX systems, a directory matching
${TMPDIR:-/tmp}/age-plugin-*
needs to exist for the attack to succeed.The...
References:
No existing reports found with this module or alias.
See doc/quickstart.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: