First published: Wed Sep 06 2023(Updated: )
Golang Go is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the html/template package. A remote attacker could exploit this vulnerability using a specially crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Credit: security@golang.org security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Go | <1.20.8 | |
Golang Go | >=1.21.0<1.21.1 | |
redhat/golang | <1.20.8 | 1.20.8 |
redhat/golang | <1.21.1 | 1.21.1 |
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
debian/golang-1.19 | <=1.19.8-2 | |
IBM Concert Software | <=1.0.0 - 1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-39318.
The severity of CVE-2023-39318 is medium.
The affected software for CVE-2023-39318 is Golang Go versions between 1.20.8 and 1.21.1.
CVE-2023-39318 affects the html/template package by not properly handling HTML-like comment tokens and hashbang #! comment tokens in <script> contexts, leading to improper interpretation of contents and potential escaping issues.
Yes, here are some references related to CVE-2023-39318: [Link 1](https://go.dev/cl/526156), [Link 2](https://go.dev/issue/62196), [Link 3](https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ).