Skip to content

Commit 3b3d7d4

Browse files
tatianabgopherbot
authored andcommitted
data/reports: add GO-2024-3306
- data/reports/GO-2024-3306.yaml Fixes #3306 Change-Id: I872e0977aa837473f0a44ddec51812c63cf9ff24 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/635705 Reviewed-by: Zvonimir Pavlinovic <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]> Auto-Submit: Tatiana Bradley <[email protected]>
1 parent 6a95f42 commit 3b3d7d4

File tree

2 files changed

+125
-0
lines changed

2 files changed

+125
-0
lines changed

data/osv/GO-2024-3306.json

+94
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,94 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2024-3306",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2024-53257",
8+
"GHSA-7mwh-q3xm-qh6p"
9+
],
10+
"summary": "Vitess allows HTML injection in /debug/querylogz and /debug/env in vitess.io/vitess",
11+
"details": "Vitess allows HTML injection in /debug/querylogz and /debug/env in vitess.io/vitess",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "vitess.io/vitess",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "0.19.8"
27+
},
28+
{
29+
"introduced": "0.20.0"
30+
},
31+
{
32+
"fixed": "0.20.4"
33+
},
34+
{
35+
"introduced": "0.21.0"
36+
},
37+
{
38+
"fixed": "0.21.1"
39+
}
40+
]
41+
}
42+
],
43+
"ecosystem_specific": {
44+
"imports": [
45+
{
46+
"path": "vitess.io/vitess/go/vt/vtgate"
47+
},
48+
{
49+
"path": "vitess.io/vitess/go/vt/vttablet/tabletserver"
50+
}
51+
],
52+
"custom_ranges": [
53+
{
54+
"type": "ECOSYSTEM",
55+
"events": [
56+
{
57+
"introduced": "0"
58+
},
59+
{
60+
"fixed": "19.0.8"
61+
},
62+
{
63+
"introduced": "20.0.0"
64+
},
65+
{
66+
"fixed": "20.0.4"
67+
},
68+
{
69+
"introduced": "21.0.0"
70+
},
71+
{
72+
"fixed": "21.0.1"
73+
}
74+
]
75+
}
76+
]
77+
}
78+
}
79+
],
80+
"references": [
81+
{
82+
"type": "ADVISORY",
83+
"url": "https://github.com/vitessio/vitess/security/advisories/GHSA-7mwh-q3xm-qh6p"
84+
},
85+
{
86+
"type": "FIX",
87+
"url": "https://github.com/vitessio/vitess/commit/2b71d1b5f8ca676beeab2875525003cd45096217"
88+
}
89+
],
90+
"database_specific": {
91+
"url": "https://pkg.go.dev/vuln/GO-2024-3306",
92+
"review_status": "REVIEWED"
93+
}
94+
}

data/reports/GO-2024-3306.yaml

+31
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
id: GO-2024-3306
2+
modules:
3+
- module: vitess.io/vitess
4+
versions:
5+
- fixed: 0.19.8
6+
- introduced: 0.20.0
7+
- fixed: 0.20.4
8+
- introduced: 0.21.0
9+
- fixed: 0.21.1
10+
non_go_versions:
11+
- fixed: 19.0.8
12+
- introduced: 20.0.0
13+
- fixed: 20.0.4
14+
- introduced: 21.0.0
15+
- fixed: 21.0.1
16+
vulnerable_at: 0.21.0
17+
packages:
18+
- package: vitess.io/vitess/go/vt/vtgate
19+
- package: vitess.io/vitess/go/vt/vttablet/tabletserver
20+
summary: Vitess allows HTML injection in /debug/querylogz and /debug/env in vitess.io/vitess
21+
cves:
22+
- CVE-2024-53257
23+
ghsas:
24+
- GHSA-7mwh-q3xm-qh6p
25+
references:
26+
- advisory: https://github.com/vitessio/vitess/security/advisories/GHSA-7mwh-q3xm-qh6p
27+
- fix: https://github.com/vitessio/vitess/commit/2b71d1b5f8ca676beeab2875525003cd45096217
28+
source:
29+
id: GHSA-7mwh-q3xm-qh6p
30+
created: 2024-12-12T14:30:01.004098-05:00
31+
review_status: REVIEWED

0 commit comments

Comments
 (0)