Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/flipped-aurora/gin-vue-admin: CVE-2022-39305 #1076

Closed
GoVulnBot opened this issue Oct 24, 2022 · 3 comments
Assignees
Labels
excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module. NeedsReport

Comments

@GoVulnBot
Copy link

CVE-2022-39305 references github.com/flipped-aurora/gin-vue-admin, which may be a Go module.

Description:
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Versions prior to 2.5.4 contain a file upload ability. The affected code fails to validate fileMd5 and fileName parameters, resulting in an arbitrary file being read. This issue is patched in 2.5.4b. There are no known workarounds.

References:

See doc/triage.md for instructions on how to triage this report.

modules:
  - module: github.com/flipped-aurora/gin-vue-admin
    packages:
      - package: gin-vue-admin
description: |
    Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Versions prior to 2.5.4 contain a file upload ability. The affected code fails to validate fileMd5 and fileName parameters, resulting in an arbitrary file being read. This issue is patched in 2.5.4b. There are no known workarounds.
cves:
  - CVE-2022-39305
references:
  - web: https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-wrmq-4v4c-gxp2
  - web: https://github.com/flipped-aurora/gin-vue-admin/blob/main/server/utils/breakpoint_continue.go

@neild
Copy link
Contributor

neild commented Nov 2, 2022

The reproduction case in GHSA-wrmq-4v4c-gxp2 is demonstrating an attack against a server, not the user of an API.

The repository's latest tagged version is v2.5.4, but the module in its go.mod file is github.com/flipped-aurora/gin-vue-admin/server with no /v2 suffix.

@neild neild added the excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module. label Nov 4, 2022
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/449156 mentions this issue: data/excluded: batch add GO-2022-1100, GO-2022-1076

gopherbot pushed a commit that referenced this issue Nov 9, 2022
Fixes #1100, #1076

Change-Id: I19c86523e5c576f1df5268bd17b96f341dc8a42c
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/449156
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Damien Neil <dneil@google.com>
Run-TryBot: Zvonimir Pavlinovic <zpavlinovic@google.com>
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/592774 mentions this issue: data/reports: unexclude 50 reports

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module. NeedsReport
Projects
None yet
Development

No branches or pull requests

6 participants