First published: Tue May 24 2022(Updated: )
A flaw was found in go-getter. Several vulnerabilities were identified in the way go-getter processes HTTP responses, response headers, and password-protected ZIP files. This flaw allows an attacker to bypass certain configuration settings and may lead to a denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp go-getter | <=1.5.11 | |
HashiCorp go-getter | =2.0.2 | |
redhat/github.com/hashicorp/go-getter | <1.6.1 | 1.6.1 |
redhat/github.com/hashicorp/go-getter | <2.1.0 | 2.1.0 |
go/github.com/hashicorp/go-getter/gcs/v2 | <2.1.0 | 2.1.0 |
go/github.com/hashicorp/go-getter/s3/v2 | <2.1.0 | 2.1.0 |
go/github.com/hashicorp/go-getter/v2 | <2.1.0 | 2.1.0 |
go/github.com/hashicorp/go-getter | >=2.0.0<2.1.0 | 2.1.0 |
go/github.com/hashicorp/go-getter | <1.6.1 | 1.6.1 |
The fix includes new configuration options to help limit the security exposure and have more secure defaults.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this flaw is CVE-2022-30322.
The severity of CVE-2022-30322 is high with a CVSS score of 8.6.
Versions up to 1.5.11 and 2.0.2 of go-getter are affected by CVE-2022-30322.
An attacker can exploit CVE-2022-30322 by bypassing certain configuration settings, leading to a denial of service.
You can find more information about CVE-2022-30322 at the following references: [link1], [link2], [link3].