First published: Tue Dec 27 2022(Updated: )
Authentication is globally bypassed in github.com/nanobox-io/golang-nanoauth between v0.0.0-20160722212129-ac0cc4484ad4 and v0.0.0-20200131131040-063a3fb69896 if ListenAndServe is called with an empty token.
Credit: security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
Digitalocean Golang-nanoauth | >=2016-07-22<=2020-01-31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-36569 is considered a high severity vulnerability due to the global authentication bypass it introduces.
To fix CVE-2020-36569, upgrade to a version of golang-nanoauth that is after v0.0.0-20200131131040-063a3fb69896.
CVE-2020-36569 affects versions of golang-nanoauth between v0.0.0-20160722212129-ac0cc4484ad4 and v0.0.0-20200131131040-063a3fb69896.
Yes, CVE-2020-36569 can be exploited remotely due to the global authentication bypass.
CVE-2020-36569 impacts any application using vulnerable versions of golang-nanoauth on platforms where it is deployed.