First published: Wed Mar 24 2021(Updated: )
go-ipfs is an open-source golang implementation of IPFS which is a global, versioned, peer-to-peer filesystem. In go-ipfs before version 0.8.0, control characters are not escaped from console output. This can result in hiding input from the user which could result in the user taking an unknown, malicious action. This is fixed in version 0.8.0.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go-ipfs | <0.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26283 has a severity rating that can vary but is considered to be moderate due to its potential impact on user input visibility.
To fix CVE-2020-26283, upgrade to go-ipfs version 0.8.0 or later, where the issue has been addressed.
The consequences of CVE-2020-26283 include the risk of user input being obscured due to unescaped control characters in console output.
CVE-2020-26283 affects all versions of go-ipfs prior to version 0.8.0.
CVE-2020-26283 is not a remote code execution vulnerability but rather a local issue affecting console output visibility.