Skip to content

Commit

Permalink
data/reports: add GO-2024-3321
Browse files Browse the repository at this point in the history
  - data/reports/GO-2024-3321.yaml

Updates #3321

Change-Id: Ib6a91a861d4032cf88d8d56ba4bf0a14b057a4af
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/635257
LUCI-TryBot-Result: Go LUCI <[email protected]>
Reviewed-by: Damien Neil <[email protected]>
Reviewed-by: Tatiana Bradley <[email protected]>
  • Loading branch information
rolandshoemaker committed Dec 11, 2024
1 parent 72a7b5a commit 8291e09
Show file tree
Hide file tree
Showing 3 changed files with 197 additions and 0 deletions.
88 changes: 88 additions & 0 deletions data/cve/v5/GO-2024-3321.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,88 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2024-45337"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto",
"descriptions": [
{
"lang": "en",
"value": "Applications and libraries which misuse the ServerConfig.PublicKeyCallback callback may be susceptible to an authorization bypass."
}
],
"affected": [
{
"vendor": "golang.org/x/crypto",
"product": "golang.org/x/crypto/ssh",
"collectionURL": "https://pkg.go.dev",
"packageName": "golang.org/x/crypto/ssh",
"versions": [
{
"version": "0",
"lessThan": "0.31.0",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "ServerConfig.PublicKeyCallback"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-1108: Excessive Reliance on Global Variables"
}
]
}
],
"references": [
{
"url": "https://go.dev/issue/70779"
},
{
"url": "https://go.dev/cl/635315"
},
{
"url": "https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909"
},
{
"url": "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ"
},
{
"url": "https://pkg.go.dev/vuln/GO-2024-3321"
}
],
"credits": [
{
"lang": "en",
"value": "Damien Tournoud (Platform.sh / Upsun)"
},
{
"lang": "en",
"value": "Patrick Dawkins (Platform.sh / Upsun)"
},
{
"lang": "en",
"value": "Vince Parker (Platform.sh / Upsun)"
},
{
"lang": "en",
"value": "Jules Duvivier (Platform.sh / Upsun)"
}
]
}
}
}
78 changes: 78 additions & 0 deletions data/osv/GO-2024-3321.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,78 @@
{
"schema_version": "1.3.1",
"id": "GO-2024-3321",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2024-45337"
],
"summary": "Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto",
"details": "Applications and libraries which misuse the ServerConfig.PublicKeyCallback callback may be susceptible to an authorization bypass.",
"affected": [
{
"package": {
"name": "golang.org/x/crypto",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "0.31.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "golang.org/x/crypto/ssh",
"symbols": [
"ServerConfig.PublicKeyCallback"
]
}
]
}
}
],
"references": [
{
"type": "REPORT",
"url": "https://go.dev/issue/70779"
},
{
"type": "FIX",
"url": "https://go.dev/cl/635315"
},
{
"type": "FIX",
"url": "https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ"
}
],
"credits": [
{
"name": "Damien Tournoud (Platform.sh / Upsun)"
},
{
"name": "Patrick Dawkins (Platform.sh / Upsun)"
},
{
"name": "Vince Parker (Platform.sh / Upsun)"
},
{
"name": "Jules Duvivier (Platform.sh / Upsun)"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2024-3321",
"review_status": "REVIEWED"
}
}
31 changes: 31 additions & 0 deletions data/reports/GO-2024-3321.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
id: GO-2024-3321
modules:
- module: golang.org/x/crypto
versions:
- fixed: 0.31.0
vulnerable_at: 0.30.0
packages:
- package: golang.org/x/crypto/ssh
symbols:
- ServerConfig.PublicKeyCallback
summary: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
description: |-
Applications and libraries which misuse the ServerConfig.PublicKeyCallback
callback may be susceptible to an authorization bypass.
credits:
- Damien Tournoud (Platform.sh / Upsun)
- Patrick Dawkins (Platform.sh / Upsun)
- Vince Parker (Platform.sh / Upsun)
- Jules Duvivier (Platform.sh / Upsun)
references:
- report: https://go.dev/issue/70779
- fix: https://go.dev/cl/635315
- fix: https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909
- web: https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ
cve_metadata:
id: CVE-2024-45337
cwe: 'CWE-1108: Excessive Reliance on Global Variables'
source:
id: go-security-team
created: 2024-12-11T08:45:55.544926-08:00
review_status: REVIEWED

0 comments on commit 8291e09

Please sign in to comment.