-
Notifications
You must be signed in to change notification settings - Fork 61
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Aliases: CVE-2023-45141, GHSA-mv73-f69x-444p Fixes #2116 Change-Id: I1ad406976f9108ad7d5d5494ff6894add31020c1 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/537138 Reviewed-by: Damien Neil <[email protected]> Commit-Queue: Tatiana Bradley <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Run-TryBot: Tatiana Bradley <[email protected]>
- Loading branch information
Showing
2 changed files
with
109 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,69 @@ | ||
{ | ||
"schema_version": "1.3.1", | ||
"id": "GO-2023-2116", | ||
"modified": "0001-01-01T00:00:00Z", | ||
"published": "0001-01-01T00:00:00Z", | ||
"aliases": [ | ||
"CVE-2023-45141", | ||
"GHSA-mv73-f69x-444p" | ||
], | ||
"summary": "CSRF token validation vulnerability in github.com/gofiber/fiber/v2", | ||
"details": "A cross-site request forgery vulnerability can allow an attacker to obtain tokens and forge malicious requests on behalf of a user. This can lead to unauthorized actions being taken on the user's behalf, potentially compromising the security and integrity of the application.\n\nThe vulnerability is caused by improper validation and enforcement of CSRF tokens within the application. The CSRF token is validated against tokens in storage but was is not tied to the original requestor that generated it, allowing for token reuse.", | ||
"affected": [ | ||
{ | ||
"package": { | ||
"name": "github.com/gofiber/fiber/v2", | ||
"ecosystem": "Go" | ||
}, | ||
"ranges": [ | ||
{ | ||
"type": "SEMVER", | ||
"events": [ | ||
{ | ||
"introduced": "0" | ||
}, | ||
{ | ||
"fixed": "2.50.0" | ||
} | ||
] | ||
} | ||
], | ||
"ecosystem_specific": { | ||
"imports": [ | ||
{ | ||
"path": "github.com/gofiber/fiber/v2/middleware/csrf", | ||
"symbols": [ | ||
"CsrfFromCookie", | ||
"CsrfFromForm", | ||
"CsrfFromHeader", | ||
"CsrfFromParam", | ||
"CsrfFromQuery", | ||
"New", | ||
"configDefault", | ||
"manager.getRaw", | ||
"manager.setRaw", | ||
"newManager" | ||
] | ||
} | ||
] | ||
} | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://github.com/gofiber/fiber/security/advisories/GHSA-mv73-f69x-444p" | ||
}, | ||
{ | ||
"type": "FIX", | ||
"url": "https://github.com/gofiber/fiber/commit/8c3916dbf4ad2ed427d02c6eb63ae8b2fa8f019a" | ||
}, | ||
{ | ||
"type": "FIX", | ||
"url": "https://github.com/gofiber/fiber/commit/b50d91d58ecdff2a330bf07950244b6c4caf65b1" | ||
} | ||
], | ||
"database_specific": { | ||
"url": "https://pkg.go.dev/vuln/GO-2023-2116" | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,40 @@ | ||
id: GO-2023-2116 | ||
modules: | ||
- module: github.com/gofiber/fiber/v2 | ||
versions: | ||
- fixed: 2.50.0 | ||
vulnerable_at: 2.49.2 | ||
packages: | ||
- package: github.com/gofiber/fiber/v2/middleware/csrf | ||
symbols: | ||
- configDefault | ||
- New | ||
- CsrfFromParam | ||
- CsrfFromForm | ||
- CsrfFromCookie | ||
- CsrfFromHeader | ||
- CsrfFromQuery | ||
- newManager | ||
- manager.getRaw | ||
- manager.setRaw | ||
summary: CSRF token validation vulnerability in github.com/gofiber/fiber/v2 | ||
description: |- | ||
A cross-site request forgery vulnerability can allow an attacker to obtain | ||
tokens and forge malicious requests on behalf of a user. This can lead to | ||
unauthorized actions being taken on the user's behalf, potentially compromising | ||
the security and integrity of the application. | ||
The vulnerability is caused by improper validation and enforcement of CSRF | ||
tokens within the application. The CSRF token is validated against tokens in | ||
storage but was is not tied to the original requestor that generated it, | ||
allowing for token reuse. | ||
cves: | ||
- CVE-2023-45141 | ||
ghsas: | ||
- GHSA-mv73-f69x-444p | ||
references: | ||
- advisory: https://github.com/gofiber/fiber/security/advisories/GHSA-mv73-f69x-444p | ||
- fix: https://github.com/gofiber/fiber/commit/8c3916dbf4ad2ed427d02c6eb63ae8b2fa8f019a | ||
- fix: https://github.com/gofiber/fiber/commit/b50d91d58ecdff2a330bf07950244b6c4caf65b1 | ||
notes: | ||
- There is a closely related vulnerability (GO-2023-2115), and it is not clear which fix applies to which vulnerability, so I have marked both fixes as applying to both vulnerabilities. |