First published: Sat Aug 01 2020(Updated: )
A flaw was found in the Go standard library packages before upstream versions 1.15 and 1.14.8. Both the net/http/cgi and net/http/fcgi packages use a default Content-Type response header value of "text/html", rather than "text/plain". This flaw allows an attacker to exploit this issue in applications using these packages by uploading crafted files, allowing a Cross-site Scripting attack (XSS). The highest threat from this vulnerability is to confidentiality and integrity.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:0.18.4-2.el8 | 0:0.18.4-2.el8 |
Golang Go | <1.14.8 | |
Golang Go | >=1.15.0<1.15.1 | |
Fedoraproject Fedora | =33 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Oracle Communications Cloud Native Core Policy | =1.5.0 | |
redhat/go | <1.15.1 | 1.15.1 |
redhat/go | <1.14.8 | 1.14.8 |
IBM Security Guardium Insights | <=2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID of this flaw is CVE-2020-24553.
The severity of CVE-2020-24553 is high with a CVSS score of 7.2.
An attacker can exploit this vulnerability by exploiting the default Content-Type response header value of "text/html" in the net/http/cgi and net/http/fcgi packages in Go.
Versions of Go before 1.14.8 and 1.15.x before 1.15.1 are affected by this vulnerability.
To fix CVE-2020-24553, update your Go installation to version 1.14.8 or 1.15.1.