First published: Tue Mar 05 2024(Updated: )
Golang Go could allow a remote attacker to bypass security restrictions, caused by a flaw in the MarshalJSON methods in the html/template package. By sending a specially crafted request, an attacker could exploit this vulnerability to inject unexpected content into templates.
Credit: security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/go | <1.21.8 | 1.21.8 |
redhat/go | <1.22.1 | 1.22.1 |
debian/golang-1.15 | <=1.15.15-1~deb11u4 | |
debian/golang-1.19 | <=1.19.8-2 | |
debian/golang-1.22 | 1.22.12-3 | |
IBM Rational Team Concert | <=1.0.0, 1.0.1, 1.0.2, 1.0.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24785 is considered a medium severity vulnerability due to the potential for remote exploitation.
To fix CVE-2024-24785, update to the appropriate versions of Go or affected software as detailed in the remediation section.
CVE-2024-24785 affects IBM Concert Software versions up to 1.0.2.1 and several versions of Golang packages across different distributions.
CVE-2024-24785 is a remote code execution vulnerability due to improper handling of JSON marshaling in the html/template package.
Yes, if exploited, CVE-2024-24785 could allow attackers to inject malicious content into templates, potentially leading to further attacks.