Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/gravitational/teleport: CVE-2022-36633, GHSA-6xf3-5hp7-xqqg #984

Closed
tatianab opened this issue Sep 9, 2022 · 3 comments
Assignees
Labels
excluded: NOT_IMPORTABLE This vulnerability only exists in a binary and is not importable. NeedsTriage

Comments

@tatianab
Copy link
Contributor

tatianab commented Sep 9, 2022

In GitHub Security Advisory GHSA-6xf3-5hp7-xqqg, there is a vulnerability in the following Go packages or modules:

Unit Fixed Vulnerable Ranges
github.com/gravitational/teleport 10.1.2 >= 10.0.0, < 10.1.2

See doc/triage.md for instructions on how to triage this report.

modules:
  - module: TODO
    versions:
      - introduced: 10.0.0
        fixed: 10.1.2
    packages:
      - package: github.com/gravitational/teleport
  - module: TODO
    versions:
      - introduced: 9.0.0
        fixed: 9.3.13
    packages:
      - package: github.com/gravitational/teleport
  - module: TODO
    versions:
      - fixed: 8.3.17
    packages:
      - package: github.com/gravitational/teleport
description: Teleport 9.3.6 is vulnerable to Command injection leading to Remote Code
    Execution. An attacker can craft a malicious ssh agent installation link by URL
    encoding a bash escape with carriage return line feed. This url encoded payload
    can be used in place of a token and sent to a user in a social engineering attack.
    This is fully unauthenticated attack utilizing the trusted teleport server to
    deliver the payload.
cves:
  - CVE-2022-36633
ghsas:
  - GHSA-6xf3-5hp7-xqqg

@zpavlinovic
Copy link
Contributor

This does not seem to be importable in the classical sense that vulnerability tools can detect as a dependency. All the places where this module is imported seem to fork this repo.

Also, the go.mod file is not following the module naming scheme when it comes to major versions >= 2. For instance:
go get github.com/gravitational/teleport@v10.1.2 go: github.com/gravitational/teleport@v10.1.2: invalid version: module contains a go.mod file, so module path must match major version ("github.com/gravitational/teleport/v10")

or

go get github.com/gravitational/teleport/v10@v10.1.2 go: github.com/gravitational/teleport@v10.1.2: invalid version: module contains a go.mod file, so module path must match major version ("github.com/gravitational/teleport/v10")

@zpavlinovic zpavlinovic added the excluded: NOT_IMPORTABLE This vulnerability only exists in a binary and is not importable. label Sep 15, 2022
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/431196 mentions this issue: data/excluded: add GO-2022-0984.yaml for CVE-2022-36633

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/592774 mentions this issue: data/reports: unexclude 50 reports

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
excluded: NOT_IMPORTABLE This vulnerability only exists in a binary and is not importable. NeedsTriage
Projects
None yet
Development

No branches or pull requests

3 participants