Skip to content

x/vulndb: potential Go vuln in github.com/google/exposure-notifications-verification-server: GHSA-5v95-v8c8-3rh6 #1326

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
GoVulnBot opened this issue Jan 9, 2023 · 1 comment

Comments

@GoVulnBot
Copy link

In GitHub Security Advisory GHSA-5v95-v8c8-3rh6, there is a vulnerability in the following Go packages or modules:

Unit Fixed Vulnerable Ranges
github.com/google/exposure-notifications-verification-server 0.23.1 < 0.23.0

Cross references:

See doc/triage.md for instructions on how to triage this report.

modules:
  - module: TODO
    versions:
      - introduced: TODO (earliest fixed "0.23.1", vuln range "< 0.23.0")
    packages:
      - package: github.com/google/exposure-notifications-verification-server
description: |-
    ### Impact
    Using a carefully crafted request or malicious proxy, a user with `UserWrite` permissions could create another user with higher privileges than their own due to insufficient checks on the allowed set of permissions. The event would be captured in the Event Log.

    ### Patches
    The issue has been fixed in 0.24.0 and 0.23.1.

    ### Workarounds
    For users who are unable to upgrade, we recommend auditing users who have `UserWrite` permissions and regularly reviewing the Event Log for malicious activity.

    ### Kudos
    Thank you to Michael Mazzolini (Ethical Hacker at WHO) for finding and disclosing this vulnerability.
cves:
  - CVE-2021-22538
ghsas:
  - GHSA-5v95-v8c8-3rh6

@tatianab
Copy link
Contributor

tatianab commented Jan 9, 2023

Duplicate of #798

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants