Skip to content

Commit 78419f2

Browse files
timothy-kingneild
authored andcommitted
data/reports: add GO-2023-1566.yaml
Aliases: CVE-2022-25978, GHSA-9w8x-5hv5-r6gw Fixes #1566 Change-Id: Ic830c62f8b06c3637a642af94d50ec50c2347ad7 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/468637 Run-TryBot: Tim King <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Reviewed-by: Damien Neil <[email protected]>
1 parent a72c845 commit 78419f2

File tree

2 files changed

+91
-0
lines changed

2 files changed

+91
-0
lines changed

data/osv/GO-2023-1566.json

+66
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
{
2+
"id": "GO-2023-1566",
3+
"published": "0001-01-01T00:00:00Z",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"aliases": [
6+
"CVE-2022-25978",
7+
"GHSA-9w8x-5hv5-r6gw"
8+
],
9+
"details": "A malicious actor can introduce links starting with a `javascript:` scheme due to insufficient checks on external resources. This can be used as a part of Cross-site Scripting (XSS) attack.",
10+
"affected": [
11+
{
12+
"package": {
13+
"name": "github.com/usememos/memos",
14+
"ecosystem": "Go"
15+
},
16+
"ranges": [
17+
{
18+
"type": "SEMVER",
19+
"events": [
20+
{
21+
"introduced": "0"
22+
},
23+
{
24+
"fixed": "0.10.4-0.20230211093429-b11d2130a084"
25+
}
26+
]
27+
}
28+
],
29+
"database_specific": {
30+
"url": "https://pkg.go.dev/vuln/GO-2023-1566"
31+
},
32+
"ecosystem_specific": {
33+
"imports": [
34+
{
35+
"path": "github.com/usememos/memos/server",
36+
"symbols": [
37+
"NewServer",
38+
"Server.registerResourcePublicRoutes",
39+
"Server.registerResourceRoutes"
40+
]
41+
}
42+
]
43+
}
44+
}
45+
],
46+
"references": [
47+
{
48+
"type": "WEB",
49+
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070"
50+
},
51+
{
52+
"type": "FIX",
53+
"url": "https://github.com/usememos/memos/commit/b11d2130a084385eb65c3761a3c841ebe9f81ae8"
54+
},
55+
{
56+
"type": "REPORT",
57+
"url": "https://github.com/usememos/memos/issues/1026"
58+
}
59+
],
60+
"credits": [
61+
{
62+
"name": "Kahla"
63+
}
64+
],
65+
"schema_version": "1.3.1"
66+
}

data/reports/GO-2023-1566.yaml

+25
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
modules:
2+
- module: github.com/usememos/memos
3+
versions:
4+
- fixed: 0.10.4-0.20230211093429-b11d2130a084
5+
vulnerable_at: 0.10.3
6+
packages:
7+
- package: github.com/usememos/memos/server
8+
symbols:
9+
- Server.registerResourcePublicRoutes
10+
- Server.registerResourceRoutes
11+
derived_symbols:
12+
- NewServer
13+
description: |
14+
A malicious actor can introduce links starting with a `javascript:` scheme
15+
due to insufficient checks on external resources. This can be used as a
16+
part of Cross-site Scripting (XSS) attack.
17+
cves:
18+
- CVE-2022-25978
19+
ghsas:
20+
- GHSA-9w8x-5hv5-r6gw
21+
credit: Kahla
22+
references:
23+
- web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUSEMEMOSMEMOSSERVER-3319070
24+
- fix: https://github.com/usememos/memos/commit/b11d2130a084385eb65c3761a3c841ebe9f81ae8
25+
- report: https://github.com/usememos/memos/issues/1026

0 commit comments

Comments
 (0)