vulnerability
CentOS Linux: CVE-2019-14809: Moderate: go-toolset:rhel8 security, bug fix, and enhancement update (CESA-2019:3433)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Aug 13, 2019 | Nov 6, 2019 | May 25, 2023 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Aug 13, 2019
Added
Nov 6, 2019
Modified
May 25, 2023
Description
net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.
Solution(s)
centos-upgrade-go-toolsetcentos-upgrade-golangcentos-upgrade-golang-bincentos-upgrade-golang-docscentos-upgrade-golang-misccentos-upgrade-golang-racecentos-upgrade-golang-srccentos-upgrade-golang-tests

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.