Skip to content

Commit 0ab8d8e

Browse files
committed
data/reports: unexclude GO-2024-2539.yaml
This is a previously-excluded binary report used to demonstrate the usage of the new "non_go_versions" field. Aliases: CVE-2024-23319, GHSA-4fp6-574p-fc35 For #2539 Change-Id: I06fa51de3e32d78bdc53bf8262e84d92e5af2d95 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/568058 LUCI-TryBot-Result: Go LUCI <[email protected]> Reviewed-by: Damien Neil <[email protected]>
1 parent 183a484 commit 0ab8d8e

File tree

4 files changed

+101
-8
lines changed

4 files changed

+101
-8
lines changed

data/excluded/GO-2024-2539.yaml

-8
This file was deleted.

data/osv/GO-2024-2539.json

+61
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2024-2539",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2024-23319",
8+
"GHSA-4fp6-574p-fc35"
9+
],
10+
"summary": "Cross-site request forgery via logout button in github.com/mattermost/mattermost-plugin-jira",
11+
"details": "Cross-site request forgery via logout button in github.com/mattermost/mattermost-plugin-jira",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/mattermost/mattermost-plugin-jira",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "1.1.2-0.20230830170046-f4cf4c6de017"
27+
}
28+
]
29+
}
30+
],
31+
"ecosystem_specific": {
32+
"imports": [
33+
{
34+
"path": "github.com/mattermost/mattermost-plugin-jira/server",
35+
"symbols": [
36+
"Plugin.httpOAuth1aDisconnect",
37+
"Plugin.initializeRouter"
38+
]
39+
}
40+
]
41+
}
42+
}
43+
],
44+
"references": [
45+
{
46+
"type": "ADVISORY",
47+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23319"
48+
},
49+
{
50+
"type": "FIX",
51+
"url": "https://github.com/mattermost/mattermost-plugin-jira/commit/f4cf4c6de017ef6aa4428d393b78f418dd84cd8e"
52+
},
53+
{
54+
"type": "WEB",
55+
"url": "https://mattermost.com/security-updates"
56+
}
57+
],
58+
"database_specific": {
59+
"url": "https://pkg.go.dev/vuln/GO-2024-2539"
60+
}
61+
}

data/reports/GO-2024-2539.yaml

+24
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
id: GO-2024-2539
2+
modules:
3+
- module: github.com/mattermost/mattermost-plugin-jira
4+
versions:
5+
- fixed: 1.1.2-0.20230830170046-f4cf4c6de017
6+
non_go_versions:
7+
- fixed: 4.0.0-rc2
8+
vulnerable_at: 1.1.2-0.20230829214939-57856e474934
9+
packages:
10+
- package: github.com/mattermost/mattermost-plugin-jira/server
11+
symbols:
12+
- Plugin.httpOAuth1aDisconnect
13+
- Plugin.initializeRouter
14+
summary: |-
15+
Cross-site request forgery via logout button in
16+
github.com/mattermost/mattermost-plugin-jira
17+
cves:
18+
- CVE-2024-23319
19+
ghsas:
20+
- GHSA-4fp6-574p-fc35
21+
references:
22+
- advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-23319
23+
- fix: https://github.com/mattermost/mattermost-plugin-jira/commit/f4cf4c6de017ef6aa4428d393b78f418dd84cd8e
24+
- web: https://mattermost.com/security-updates

doc/format.md

+16
Original file line numberDiff line numberDiff line change
@@ -103,6 +103,22 @@ A non-Go version range can be used to specify versions used by
103103
module maintainers that do not conform to [Go's module
104104
version conventions](https://go.dev/doc/modules/version-numbers).
105105

106+
An example is data/reports/GO-2024-2539.yaml, whose vulnerable versions
107+
are listed as:
108+
109+
```yaml
110+
versions:
111+
- fixed: 1.1.2-0.20230830170046-f4cf4c6de017
112+
non_go_versions:
113+
- fixed: 4.0.0-rc2
114+
vulnerable_at: 1.1.2-0.20230829214939-57856e474934
115+
```
116+
117+
The [GHSA](https://github.com/advisories/GHSA-4fp6-574p-fc35) for this report
118+
lists a fixed version, `4.0.0-rc2`, which is not known to the module proxy.
119+
To encode this, we list that version as a "non-Go" version, and put the
120+
pseudo-version corresponding to the fix commit in the regular `versions` section.
121+
106122
### `module.vulnerable_at`
107123

108124
type `string`

0 commit comments

Comments
 (0)