First published: Tue Jan 28 2025(Updated: )
Credentials provided via the new GOAUTH feature were not being properly segmented by domain, allowing a malicious server to request credentials they should not have access to. By default, unless otherwise set, this only affected credentials stored in the users .netrc file.
Credit: security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
Go (Golang) language by Google |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45340 has been assessed as a moderate severity vulnerability due to the risk of credential exposure.
To mitigate CVE-2024-45340, ensure proper domain segmentation for credentials in the Goauth feature and review your .netrc file configurations.
CVE-2024-45340 could allow a malicious server to access sensitive credentials, leading to unauthorized access and potential data breaches.
CVE-2024-45340 affects the Go programming language without specific version limitations mentioned in the vulnerability report.
CVE-2024-45340 is not limited to a specific operating system, as it is related to the Go programming language's handling of credentials.