Skip to content

Commit 86364d3

Browse files
committed
data/reports: add GO-2023-2116.yaml
Aliases: CVE-2023-45141, GHSA-mv73-f69x-444p Fixes #2116 Change-Id: I1ad406976f9108ad7d5d5494ff6894add31020c1 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/537138 Reviewed-by: Damien Neil <[email protected]> Commit-Queue: Tatiana Bradley <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Run-TryBot: Tatiana Bradley <[email protected]>
1 parent 2e27b7d commit 86364d3

File tree

2 files changed

+109
-0
lines changed

2 files changed

+109
-0
lines changed

data/osv/GO-2023-2116.json

+69
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2023-2116",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2023-45141",
8+
"GHSA-mv73-f69x-444p"
9+
],
10+
"summary": "CSRF token validation vulnerability in github.com/gofiber/fiber/v2",
11+
"details": "A cross-site request forgery vulnerability can allow an attacker to obtain tokens and forge malicious requests on behalf of a user. This can lead to unauthorized actions being taken on the user's behalf, potentially compromising the security and integrity of the application.\n\nThe vulnerability is caused by improper validation and enforcement of CSRF tokens within the application. The CSRF token is validated against tokens in storage but was is not tied to the original requestor that generated it, allowing for token reuse.",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/gofiber/fiber/v2",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "2.50.0"
27+
}
28+
]
29+
}
30+
],
31+
"ecosystem_specific": {
32+
"imports": [
33+
{
34+
"path": "github.com/gofiber/fiber/v2/middleware/csrf",
35+
"symbols": [
36+
"CsrfFromCookie",
37+
"CsrfFromForm",
38+
"CsrfFromHeader",
39+
"CsrfFromParam",
40+
"CsrfFromQuery",
41+
"New",
42+
"configDefault",
43+
"manager.getRaw",
44+
"manager.setRaw",
45+
"newManager"
46+
]
47+
}
48+
]
49+
}
50+
}
51+
],
52+
"references": [
53+
{
54+
"type": "ADVISORY",
55+
"url": "https://github.com/gofiber/fiber/security/advisories/GHSA-mv73-f69x-444p"
56+
},
57+
{
58+
"type": "FIX",
59+
"url": "https://github.com/gofiber/fiber/commit/8c3916dbf4ad2ed427d02c6eb63ae8b2fa8f019a"
60+
},
61+
{
62+
"type": "FIX",
63+
"url": "https://github.com/gofiber/fiber/commit/b50d91d58ecdff2a330bf07950244b6c4caf65b1"
64+
}
65+
],
66+
"database_specific": {
67+
"url": "https://pkg.go.dev/vuln/GO-2023-2116"
68+
}
69+
}

data/reports/GO-2023-2116.yaml

+40
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
id: GO-2023-2116
2+
modules:
3+
- module: github.com/gofiber/fiber/v2
4+
versions:
5+
- fixed: 2.50.0
6+
vulnerable_at: 2.49.2
7+
packages:
8+
- package: github.com/gofiber/fiber/v2/middleware/csrf
9+
symbols:
10+
- configDefault
11+
- New
12+
- CsrfFromParam
13+
- CsrfFromForm
14+
- CsrfFromCookie
15+
- CsrfFromHeader
16+
- CsrfFromQuery
17+
- newManager
18+
- manager.getRaw
19+
- manager.setRaw
20+
summary: CSRF token validation vulnerability in github.com/gofiber/fiber/v2
21+
description: |-
22+
A cross-site request forgery vulnerability can allow an attacker to obtain
23+
tokens and forge malicious requests on behalf of a user. This can lead to
24+
unauthorized actions being taken on the user's behalf, potentially compromising
25+
the security and integrity of the application.
26+
27+
The vulnerability is caused by improper validation and enforcement of CSRF
28+
tokens within the application. The CSRF token is validated against tokens in
29+
storage but was is not tied to the original requestor that generated it,
30+
allowing for token reuse.
31+
cves:
32+
- CVE-2023-45141
33+
ghsas:
34+
- GHSA-mv73-f69x-444p
35+
references:
36+
- advisory: https://github.com/gofiber/fiber/security/advisories/GHSA-mv73-f69x-444p
37+
- fix: https://github.com/gofiber/fiber/commit/8c3916dbf4ad2ed427d02c6eb63ae8b2fa8f019a
38+
- fix: https://github.com/gofiber/fiber/commit/b50d91d58ecdff2a330bf07950244b6c4caf65b1
39+
notes:
40+
- There is a closely related vulnerability (GO-2023-2115), and it is not clear which fix applies to which vulnerability, so I have marked both fixes as applying to both vulnerabilities.

0 commit comments

Comments
 (0)