First published: Tue Apr 04 2023(Updated: )
Golang Go could allow a remote attacker to execute arbitrary code on the system, caused by the failure to properly consider backticks (`) as Javascript string delimiters. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Credit: security@golang.org security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Go | <1.19.8 | |
Golang Go | >=1.20.0<1.20.3 | |
redhat/golang | <1.20.3 | 1.20.3 |
redhat/golang | <1.19.8 | 1.19.8 |
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
debian/golang-1.19 | 1.19.8-2 | |
IBM Concert Software | <=1.0.0 - 1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-24538.
The severity rating of CVE-2023-24538 is critical with a value of 9.8.
Versions up to but excluding 1.19.8 of Golang Go, as well as versions up to but excluding 1.20.3 of Golang Go, are affected by CVE-2023-24538.
To fix CVE-2023-24538, update your Golang Go package to version 1.19.8 or later if you are using a version below 1.19.8, or update to version 1.20.3 or later if you are using a version between 1.20.0 and 1.20.3.
Yes, you can find references for CVE-2023-24538 at the following links: [link1], [link2], [link3].