Skip to content

Commit

Permalink
data/reports: add GO-2022-1201.yaml
Browse files Browse the repository at this point in the history
Aliases: CVE-2021-4294

Fixes #1201

Change-Id: I4c25d527b44634fa056982d25eb9406fb3e7a737
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/460415
Run-TryBot: Damien Neil <[email protected]>
TryBot-Result: Gopher Robot <[email protected]>
Reviewed-by: Zvonimir Pavlinovic <[email protected]>
  • Loading branch information
neild committed Jan 3, 2023
1 parent 708d76d commit aeec1a2
Show file tree
Hide file tree
Showing 2 changed files with 78 additions and 0 deletions.
57 changes: 57 additions & 0 deletions data/osv/GO-2022-1201.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,57 @@
{
"id": "GO-2022-1201",
"published": "0001-01-01T00:00:00Z",
"modified": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2021-4294"
],
"details": "Client secret checks are vulnerable to timing attacks, which could permit an attacker to determine client secrets.",
"affected": [
{
"package": {
"name": "github.com/openshift/osin",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.0.2-0.20210113124101-8612686d6dda"
}
]
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2022-1201"
},
"ecosystem_specific": {
"imports": [
{
"path": "github.com/openshift/osin",
"symbols": [
"CheckClientSecret",
"DefaultClient.ClientSecretMatches",
"Server.HandleAccessRequest",
"Server.HandleAuthorizeRequest"
]
}
]
}
}
],
"references": [
{
"type": "FIX",
"url": "https://github.com/openshift/osin/pull/200"
},
{
"type": "FIX",
"url": "https://github.com/openshift/osin/commit/8612686d6dda34ae9ef6b5a974e4b7accb4fea29"
}
],
"schema_version": "1.3.1"
}
21 changes: 21 additions & 0 deletions data/reports/GO-2022-1201.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
modules:
- module: github.com/openshift/osin
versions:
- fixed: 1.0.2-0.20210113124101-8612686d6dda
vulnerable_at: 1.0.1
packages:
- package: github.com/openshift/osin
symbols:
- DefaultClient.ClientSecretMatches
- CheckClientSecret
derived_symbols:
- Server.HandleAccessRequest
- Server.HandleAuthorizeRequest
description: |
Client secret checks are vulnerable to timing attacks, which could
permit an attacker to determine client secrets.
cves:
- CVE-2021-4294
references:
- fix: https://github.com/openshift/osin/pull/200
- fix: https://github.com/openshift/osin/commit/8612686d6dda34ae9ef6b5a974e4b7accb4fea29

0 comments on commit aeec1a2

Please sign in to comment.