First published: Tue Aug 13 2019(Updated: )
A vulnerability was found in net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com. Reference: <a href="https://github.com/golang/go/issues/29098">https://github.com/golang/go/issues/29098</a> Upstream commit: <a href="https://github.com/golang/go/commit/61bb56ad63992a3199acc55b2537c8355ef887b6">https://github.com/golang/go/commit/61bb56ad63992a3199acc55b2537c8355ef887b6</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/golang-1.11 | 1.11.6-1+deb10u4 1.11.6-1+deb10u7 | |
redhat/go | <1.12.8 | 1.12.8 |
Golang Go | <1.11.13 | |
Golang Go | >=1.12.0<1.12.8 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.