TIBCOSoftware / mashling

Project Mashling
86 stars 15 forks source link

CVE-2022-30633 (High) detected in third_party-gogo1.11beta1 #265

Open mend-for-github-com[bot] opened 2 years ago

mend-for-github-com[bot] commented 2 years ago

CVE-2022-30633 - High Severity Vulnerability

Vulnerable Library - third_party-gogo1.11beta1

0

Library home page: https://github.com/fuchsia-mirror/third_party-go.git

Vulnerable Source Files (1)

/vendor/golang.org/x/net/webdav/internal/xml/read.go

Vulnerability Details

Uncontrolled recursion in Unmarshal in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via unmarshalling an XML document into a Go struct which has a nested field that uses the 'any' field tag.

Publish Date: 2022-08-10

URL: CVE-2022-30633

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://security-tracker.debian.org/tracker/CVE-2022-30633

Release Date: 2022-05-13

Fix Resolution: go1.17.12,go1.18.4