vulnerability
Ubuntu: (CVE-2019-14809): golang-1.8 vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Aug 13, 2019 | Jun 26, 2025 | Jun 26, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Aug 13, 2019
Added
Jun 26, 2025
Modified
Jun 26, 2025
Description
net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.
Solution
no-fix-ubuntu-package
References
- CVE-2019-14809
- https://attackerkb.com/topics/CVE-2019-14809
- URL-https://github.com/golang/go/commit/3226f2d492963d361af9dfc6714ef141ba606713
- URL-https://github.com/golang/go/commit/c1d9ca70995dc232a2145e3214f94e03409f6fcc
- URL-https://github.com/golang/go/issues/29098
- URL-https://groups.google.com/forum/#!topic/golang-announce/0uuMm1BwpHE
- URL-https://groups.google.com/forum/#!topic/golang-announce/65QixT3tcmg
- URL-https://www.cve.org/CVERecord?id=CVE-2019-14809
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.