7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
6.9 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
25.8%
github.com/golang/go is vulnerable to Insecure Protocol Handling. The vulnerability exists in the repoRootFromVCSPaths
function of vcs.go
when using go get to fetch a module with the .git
suffix. It may unexpectedly fallback to the insecure git://
protocol if the module is unavailable via the secure https://
and git+ssh://
protocols, even if GOINSECURE
is not set. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off), which may lead to a man-in-the-middle attack.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/golang/go | le | go1.21.4 | |
github.com/golang/go | le | go1.20.11 | |
github.com/golang/go | le | go1.21.4 | |
github.com/golang/go | le | go1.20.11 |
bugzilla.suse.com/show_bug.cgi?id=1217834
github.com/golang/go/commit/23c943e5296c6fa3a6f9433bd929306c4dbf2aa3
github.com/golang/go/commit/46bc33819ac86a9596b8059235842f0e0c7469bd
github.com/golang/go/issues/63845
go-review.googlesource.com/c/go/+/540257
go.dev/cl/540257
go.dev/issue/63845
groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ
lists.fedoraproject.org/archives/list/[email protected]/message/UIU6HOGV6RRIKWM57LOXQA75BGZSIH6G/
pkg.go.dev/vuln/GO-2023-2383
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
6.9 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
25.8%