First published: Wed Sep 06 2023(Updated: )
Golang Go is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the html/template package. A remote attacker could exploit this vulnerability using a specially crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Credit: security@golang.org security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Go | <1.20.8 | |
Golang Go | >=1.21.0<1.21.1 | |
redhat/golang | <1.20.8 | 1.20.8 |
redhat/golang | <1.21.1 | 1.21.1 |
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
debian/golang-1.19 | <=1.19.8-2 | |
IBM Concert Software | <=1.0.0 - 1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-39319.
The severity of CVE-2023-39319 is medium with a CVSS score of 6.1.
Golang Go versions up to 1.20.8 and versions between 1.21.0 and 1.21.1 are affected by CVE-2023-39319.
CVE-2023-39319 affects the html/template package by improperly handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts, causing actions to be improperly escaped.
To fix CVE-2023-39319, it is recommended to update Golang Go to versions 1.20.8 or 1.21.2 or later.