File tree 2 files changed +91
-0
lines changed
2 files changed +91
-0
lines changed Original file line number Diff line number Diff line change
1
+ {
2
+ "id" : " GO-2023-1566" ,
3
+ "published" : " 0001-01-01T00:00:00Z" ,
4
+ "modified" : " 0001-01-01T00:00:00Z" ,
5
+ "aliases" : [
6
+ " CVE-2022-25978" ,
7
+ " GHSA-9w8x-5hv5-r6gw"
8
+ ],
9
+ "details" : " A malicious actor can introduce links starting with a `javascript:` scheme due to insufficient checks on external resources. This can be used as a part of Cross-site Scripting (XSS) attack." ,
10
+ "affected" : [
11
+ {
12
+ "package" : {
13
+ "name" : " github.com/usememos/memos" ,
14
+ "ecosystem" : " Go"
15
+ },
16
+ "ranges" : [
17
+ {
18
+ "type" : " SEMVER" ,
19
+ "events" : [
20
+ {
21
+ "introduced" : " 0"
22
+ },
23
+ {
24
+ "fixed" : " 0.10.4-0.20230211093429-b11d2130a084"
25
+ }
26
+ ]
27
+ }
28
+ ],
29
+ "database_specific" : {
30
+ "url" : " https://pkg.go.dev/vuln/GO-2023-1566"
31
+ },
32
+ "ecosystem_specific" : {
33
+ "imports" : [
34
+ {
35
+ "path" : " github.com/usememos/memos/server" ,
36
+ "symbols" : [
37
+ " NewServer" ,
38
+ " Server.registerResourcePublicRoutes" ,
39
+ " Server.registerResourceRoutes"
40
+ ]
41
+ }
42
+ ]
43
+ }
44
+ }
45
+ ],
46
+ "references" : [
47
+ {
48
+ "type" : " WEB" ,
49
+ "url" : " https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070"
50
+ },
51
+ {
52
+ "type" : " FIX" ,
53
+ "url" : " https://github.com/usememos/memos/commit/b11d2130a084385eb65c3761a3c841ebe9f81ae8"
54
+ },
55
+ {
56
+ "type" : " REPORT" ,
57
+ "url" : " https://github.com/usememos/memos/issues/1026"
58
+ }
59
+ ],
60
+ "credits" : [
61
+ {
62
+ "name" : " Kahla"
63
+ }
64
+ ],
65
+ "schema_version" : " 1.3.1"
66
+ }
Original file line number Diff line number Diff line change
1
+ modules :
2
+ - module : github.com/usememos/memos
3
+ versions :
4
+ - fixed : 0.10.4-0.20230211093429-b11d2130a084
5
+ vulnerable_at : 0.10.3
6
+ packages :
7
+ - package : github.com/usememos/memos/server
8
+ symbols :
9
+ - Server.registerResourcePublicRoutes
10
+ - Server.registerResourceRoutes
11
+ derived_symbols :
12
+ - NewServer
13
+ description : |
14
+ A malicious actor can introduce links starting with a `javascript:` scheme
15
+ due to insufficient checks on external resources. This can be used as a
16
+ part of Cross-site Scripting (XSS) attack.
17
+ cves :
18
+ - CVE-2022-25978
19
+ ghsas :
20
+ - GHSA-9w8x-5hv5-r6gw
21
+ credit : Kahla
22
+ references :
23
+ - web : https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070
24
+ - fix : https://github.com/usememos/memos/commit/b11d2130a084385eb65c3761a3c841ebe9f81ae8
25
+ - report : https://github.com/usememos/memos/issues/1026
You can’t perform that action at this time.
0 commit comments