go-getter up to 1.5.11 and 2.0.2 allowed protocol switching, endless redirect, and configuration bypass via abuse of custom HTTP response header processing. Fixed in 1.6.1 and 2.1.0.
Mend Note: After conducting further research, Mend has determined that all versions of go-getter up to version v1.6.0 and v2.1.0 are vulnerable to CVE-2022-26945.
CVE-2022-26945 - Critical Severity Vulnerability
Vulnerable Library - github.com/hashicorp/go-getter-v1.1.0
Package for downloading things from a string URL using a variety of protocols.
Library home page: https://proxy.golang.org/github.com/hashicorp/go-getter/@v/v1.1.0.zip
Path to dependency file: /go.mod
Path to vulnerable library: /go.mod
Dependency Hierarchy: - github.com/hashiCorp/terraform-v0.12.0-beta2 (Root Library) - :x: **github.com/hashicorp/go-getter-v1.1.0** (Vulnerable Library)
Found in HEAD commit: f7fe51cfc9cb28df7c91cd678cb98694031e1c0a
Found in base branch: master
Vulnerability Details
go-getter up to 1.5.11 and 2.0.2 allowed protocol switching, endless redirect, and configuration bypass via abuse of custom HTTP response header processing. Fixed in 1.6.1 and 2.1.0. Mend Note: After conducting further research, Mend has determined that all versions of go-getter up to version v1.6.0 and v2.1.0 are vulnerable to CVE-2022-26945.
Publish Date: 2022-05-25
URL: CVE-2022-26945
CVSS 3 Score Details (9.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://discuss.hashicorp.com/t/hcsec-2022-13-multiple-vulnerabilities-in-go-getter-library/39930
Release Date: 2022-05-25
Fix Resolution: v1.6.0;v2.1.0