Skip to content

Commit

Permalink
data/reports: add GO-2023-2116.yaml
Browse files Browse the repository at this point in the history
Aliases: CVE-2023-45141, GHSA-mv73-f69x-444p

Fixes #2116

Change-Id: I1ad406976f9108ad7d5d5494ff6894add31020c1
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/537138
Reviewed-by: Damien Neil <[email protected]>
Commit-Queue: Tatiana Bradley <[email protected]>
TryBot-Result: Gopher Robot <[email protected]>
Run-TryBot: Tatiana Bradley <[email protected]>
  • Loading branch information
tatianab committed Oct 24, 2023
1 parent 2e27b7d commit 86364d3
Show file tree
Hide file tree
Showing 2 changed files with 109 additions and 0 deletions.
69 changes: 69 additions & 0 deletions data/osv/GO-2023-2116.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,69 @@
{
"schema_version": "1.3.1",
"id": "GO-2023-2116",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-45141",
"GHSA-mv73-f69x-444p"
],
"summary": "CSRF token validation vulnerability in github.com/gofiber/fiber/v2",
"details": "A cross-site request forgery vulnerability can allow an attacker to obtain tokens and forge malicious requests on behalf of a user. This can lead to unauthorized actions being taken on the user's behalf, potentially compromising the security and integrity of the application.\n\nThe vulnerability is caused by improper validation and enforcement of CSRF tokens within the application. The CSRF token is validated against tokens in storage but was is not tied to the original requestor that generated it, allowing for token reuse.",
"affected": [
{
"package": {
"name": "github.com/gofiber/fiber/v2",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
},
{
"fixed": "2.50.0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/gofiber/fiber/v2/middleware/csrf",
"symbols": [
"CsrfFromCookie",
"CsrfFromForm",
"CsrfFromHeader",
"CsrfFromParam",
"CsrfFromQuery",
"New",
"configDefault",
"manager.getRaw",
"manager.setRaw",
"newManager"
]
}
]
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/gofiber/fiber/security/advisories/GHSA-mv73-f69x-444p"
},
{
"type": "FIX",
"url": "https://github.com/gofiber/fiber/commit/8c3916dbf4ad2ed427d02c6eb63ae8b2fa8f019a"
},
{
"type": "FIX",
"url": "https://github.com/gofiber/fiber/commit/b50d91d58ecdff2a330bf07950244b6c4caf65b1"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2116"
}
}
40 changes: 40 additions & 0 deletions data/reports/GO-2023-2116.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
id: GO-2023-2116
modules:
- module: github.com/gofiber/fiber/v2
versions:
- fixed: 2.50.0
vulnerable_at: 2.49.2
packages:
- package: github.com/gofiber/fiber/v2/middleware/csrf
symbols:
- configDefault
- New
- CsrfFromParam
- CsrfFromForm
- CsrfFromCookie
- CsrfFromHeader
- CsrfFromQuery
- newManager
- manager.getRaw
- manager.setRaw
summary: CSRF token validation vulnerability in github.com/gofiber/fiber/v2
description: |-
A cross-site request forgery vulnerability can allow an attacker to obtain
tokens and forge malicious requests on behalf of a user. This can lead to
unauthorized actions being taken on the user's behalf, potentially compromising
the security and integrity of the application.
The vulnerability is caused by improper validation and enforcement of CSRF
tokens within the application. The CSRF token is validated against tokens in
storage but was is not tied to the original requestor that generated it,
allowing for token reuse.
cves:
- CVE-2023-45141
ghsas:
- GHSA-mv73-f69x-444p
references:
- advisory: https://github.com/gofiber/fiber/security/advisories/GHSA-mv73-f69x-444p
- fix: https://github.com/gofiber/fiber/commit/8c3916dbf4ad2ed427d02c6eb63ae8b2fa8f019a
- fix: https://github.com/gofiber/fiber/commit/b50d91d58ecdff2a330bf07950244b6c4caf65b1
notes:
- There is a closely related vulnerability (GO-2023-2115), and it is not clear which fix applies to which vulnerability, so I have marked both fixes as applying to both vulnerabilities.

0 comments on commit 86364d3

Please sign in to comment.