Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

x/vulndb: potential Go vuln in github.com/swoole/swoole-src: CVE-2020-24275 #1954

Closed
GoVulnBot opened this issue Jul 20, 2023 · 2 comments
Assignees
Labels
excluded: NOT_GO_CODE This vulnerability does not refer to a Go module.

Comments

@GoVulnBot
Copy link

CVE-2020-24275 references github.com/swoole/swoole-src, which may be a Go module.

Description:
A HTTP response header injection vulnerability in Swoole v4.5.2 allows attackers to execute arbitrary code via supplying a crafted URL.

References:

Cross references:
No existing reports found with this module or alias.

See doc/triage.md for instructions on how to triage this report.

modules:
    - module: github.com/swoole/swoole-src
      vulnerable_at: 5.0.3+incompatible
      packages:
        - package: n/a
description: |-
    A HTTP response header injection vulnerability in Swoole v4.5.2 allows attackers
    to execute arbitrary code via supplying a crafted URL.
cves:
    - CVE-2020-24275
references:
    - fix: https://github.com/swoole/swoole-src/pull/3539
    - fix: https://github.com/swoole/swoole-src/pull/3545
    - web: https://blog.cal1.cn/post/HTTP%20Response%20Header%20Injection%20in%20Swoole%3C%3D4.5.2
    - report: https://portswigger.net/kb/issues/00200200_http-response-header-injection

@neild
Copy link
Contributor

neild commented Jul 31, 2023

Swoole is an event-driven, asynchronous, coroutine-based concurrency library with high performance for PHP.

@neild neild self-assigned this Jul 31, 2023
@neild neild added the excluded: NOT_GO_CODE This vulnerability does not refer to a Go module. label Jul 31, 2023
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/514636 mentions this issue: data/excluded: batch add 31 excluded reports

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
excluded: NOT_GO_CODE This vulnerability does not refer to a Go module.
Projects
None yet
Development

No branches or pull requests

3 participants