First published: Tue May 24 2022(Updated: )
A flaw was found in go-getter. Several vulnerabilities were identified in how go-getter processes HTTP responses, response headers, and password-protected ZIP files. This flaw allows an attacker to bypass certain configuration settings and may lead to a denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp go-getter | <=1.5.11 | |
HashiCorp go-getter | =2.0.2 | |
redhat/github.com/hashicorp/go-getter | <1.6.1 | 1.6.1 |
redhat/github.com/hashicorp/go-getter | <2.1.0 | 2.1.0 |
go/github.com/hashicorp/go-getter/gcs/v2 | <2.1.0 | 2.1.0 |
go/github.com/hashicorp/go-getter/s3/v2 | <2.1.0 | 2.1.0 |
go/github.com/hashicorp/go-getter/v2 | <2.1.0 | 2.1.0 |
go/github.com/hashicorp/go-getter | >=2.0.0<2.1.0 | 2.1.0 |
go/github.com/hashicorp/go-getter | <1.6.1 | 1.6.1 |
The fix includes new configuration options to help limit the security exposure and have more secure defaults.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-30323 is a vulnerability found in go-getter that allows an attacker to bypass certain configuration settings and may lead to a denial of service.
Go-getter processes HTTP responses in a vulnerable way that can be exploited by attackers.
An attacker can bypass certain configuration settings and potentially cause a denial of service.
The vulnerability in go-getter can be fixed by updating to version 1.6.1 or higher.
You can find more information about CVE-2022-30323 in the references provided.