First published: Tue Oct 04 2022(Updated: )
A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request's form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.
Credit: security@golang.org security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:1.6.1-1.el8 | 0:1.6.1-1.el8 |
redhat/go-toolset | <1.18-0:1.18.9-1.el7_9 | 1.18-0:1.18.9-1.el7_9 |
redhat/go-toolset | <1.18-golang-0:1.18.9-1.el7_9 | 1.18-golang-0:1.18.9-1.el7_9 |
redhat/osbuild-composer | <0:75-1.el8 | 0:75-1.el8 |
redhat/weldr-client | <0:35.9-2.el8 | 0:35.9-2.el8 |
redhat/grafana | <0:7.5.15-4.el8 | 0:7.5.15-4.el8 |
redhat/git-lfs | <0:3.2.0-2.el8 | 0:3.2.0-2.el8 |
redhat/golang | <0:1.18.9-1.el9_1 | 0:1.18.9-1.el9_1 |
redhat/grafana | <0:9.0.9-2.el9 | 0:9.0.9-2.el9 |
redhat/osbuild-composer | <0:76-2.el9_2 | 0:76-2.el9_2 |
redhat/weldr-client | <0:35.9-1.el9 | 0:35.9-1.el9 |
redhat/git-lfs | <0:3.2.0-1.el9 | 0:3.2.0-1.el9 |
redhat/ignition | <0:2.14.0-5.rhaos4.12.el8 | 0:2.14.0-5.rhaos4.12.el8 |
redhat/openshift-clients | <0:4.12.0-202301042257.p0.g854f807.assembly.stream.el8 | 0:4.12.0-202301042257.p0.g854f807.assembly.stream.el8 |
redhat/buildah | <1:1.23.4-4.rhaos4.12.el8 | 1:1.23.4-4.rhaos4.12.el8 |
redhat/conmon | <2:2.1.2-4.rhaos4.12.el8 | 2:2.1.2-4.rhaos4.12.el8 |
redhat/podman | <3:4.2.0-6.1.rhaos4.12.el8 | 3:4.2.0-6.1.rhaos4.12.el8 |
redhat/skopeo | <2:1.9.4-3.rhaos4.12.el9 | 2:1.9.4-3.rhaos4.12.el9 |
redhat/etcd | <0:3.3.23-12.el8 | 0:3.3.23-12.el8 |
redhat/skupper-cli | <0:1.4.1-2.el8 | 0:1.4.1-2.el8 |
redhat/skupper-cli | <0:1.4.1-2.el9 | 0:1.4.1-2.el9 |
Golang Go | <1.18.7 | |
Golang Go | >=1.19.0<1.19.2 | |
redhat/go | <1.19.2 | 1.19.2 |
redhat/go | <1.18.7 | 1.18.7 |
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
debian/golang-1.19 | 1.19.8-2 | |
IBM Concert Software | <=1.0.0 - 1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2022-2880.
The severity of CVE-2022-2880 is high with a CVSS score of 7.5.
The affected software packages include go, openshift-serverless-clients, go-toolset, osbuild-composer, weldr-client, grafana, git-lfs, golang, ignition, openshift-clients, buildah, conmon, podman, skopeo, etcd, and skupper-cli.
The remediation for CVE-2022-2880 is to upgrade to version 1.19.2 of the go package.
More information about CVE-2022-2880 can be found in the following references: [Link 1](https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1), [Link 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2132876), [Link 3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2132877).