Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

x/vulndb: potential Go vuln in github.com/hashicorp/consul: GHSA-q6h7-4qgw-2j9p #615

Closed
julieqiu opened this issue Aug 1, 2022 · 3 comments
Assignees
Labels
excluded: NOT_IMPORTABLE This vulnerability only exists in a binary and is not importable.

Comments

@julieqiu
Copy link
Member

julieqiu commented Aug 1, 2022

In GitHub Security Advisory GHSA-q6h7-4qgw-2j9p, there is a vulnerability in the following Go packages or modules:

Unit Fixed Vulnerable Ranges
github.com/hashicorp/consul 1.11.5 >= 1.11.0, < 1.11.5

See doc/triage.md for instructions on how to triage this report.

packages:
  - package: github.com/hashicorp/consul
    versions:
      - introduced: 1.11.0
        fixed: 1.11.5
  - package: github.com/hashicorp/consul
    versions:
      - introduced: 1.10.0
        fixed: 1.10.10
  - package: github.com/hashicorp/consul
    versions:
      - fixed: 1.9.17
description: ' A vulnerability was identified in Consul and Consul Enterprise (“Consul”)
    such that HTTP health check endpoints returning an HTTP redirect may be abused
    as a vector for server-side request forgery (SSRF). This vulnerability, CVE-2022-29153,
    was fixed in Consul 1.9.17, 1.10.10, and 1.11.5.'
published: 2022-04-20T00:00:33Z
last_modified: 2022-06-03T21:11:19Z
cves:
  - CVE-2022-29153
ghsas:
  - GHSA-q6h7-4qgw-2j9p
links:
    context:
      - https://github.com/advisories/GHSA-q6h7-4qgw-2j9p

@julieqiu julieqiu self-assigned this Aug 3, 2022
@julieqiu
Copy link
Member Author

julieqiu commented Aug 3, 2022

Vuln in tool. Not importable.

@julieqiu julieqiu closed this as completed Aug 3, 2022
@neild neild added excluded: NOT_IMPORTABLE This vulnerability only exists in a binary and is not importable. and removed NotGoVuln labels Aug 10, 2022
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/592769 mentions this issue: data/reports: unexclude 50 reports

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/607222 mentions this issue: data/reports: unexclude 20 reports (20)

gopherbot pushed a commit that referenced this issue Aug 21, 2024
  - data/reports/GO-2022-0609.yaml
  - data/reports/GO-2022-0611.yaml
  - data/reports/GO-2022-0612.yaml
  - data/reports/GO-2022-0615.yaml
  - data/reports/GO-2022-0616.yaml
  - data/reports/GO-2022-0617.yaml
  - data/reports/GO-2022-0618.yaml
  - data/reports/GO-2022-0620.yaml
  - data/reports/GO-2022-0622.yaml
  - data/reports/GO-2022-0623.yaml
  - data/reports/GO-2022-0625.yaml
  - data/reports/GO-2022-0626.yaml
  - data/reports/GO-2022-0630.yaml
  - data/reports/GO-2022-0631.yaml
  - data/reports/GO-2022-0632.yaml
  - data/reports/GO-2022-0634.yaml
  - data/reports/GO-2022-0636.yaml
  - data/reports/GO-2022-0638.yaml
  - data/reports/GO-2022-0640.yaml
  - data/reports/GO-2022-0641.yaml

Updates #609
Updates #611
Updates #612
Updates #615
Updates #616
Updates #617
Updates #618
Updates #620
Updates #622
Updates #623
Updates #625
Updates #626
Updates #630
Updates #631
Updates #632
Updates #634
Updates #636
Updates #638
Updates #640
Updates #641

Change-Id: I9fc909832a7e4eb1d23e5eee482674e307e3ee5c
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/607222
Reviewed-by: Damien Neil <dneil@google.com>
Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
excluded: NOT_IMPORTABLE This vulnerability only exists in a binary and is not importable.
Projects
None yet
Development

No branches or pull requests

3 participants