Linux Security
    Linux Security
    Linux Security

    ArchLinux: 202009-3: go: cross-site scripting

    Date
    99
    Posted By
    The package go before version 1.15.1-1 is vulnerable to cross-site scripting.
    Arch Linux Security Advisory ASA-202009-3
    =========================================
    
    Severity: Medium
    Date    : 2020-09-03
    CVE-ID  : CVE-2020-24553
    Package : go
    Type    : cross-site scripting
    Remote  : Yes
    Link    : https://security.archlinux.org/AVG-1215
    
    Summary
    =======
    
    The package go before version 1.15.1-1 is vulnerable to cross-site
    scripting.
    
    Resolution
    ==========
    
    Upgrade to 1.15.1-1.
    
    # pacman -Syu "go>=1.15.1-1"
    
    The problem has been fixed upstream in version 1.15.1.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    In Go versions before 1.15.1 and 1.14.8 if the Content-Type header of a
    Handler was not explicitly set the net/http/cgi and net/http/fcgi
    packages would default to “text/html”, which could cause a Cross-Site
    Scripting vulnerability if an attacker can control any part of the
    contents of a response.
    
    Impact
    ======
    
    A remote attacker is able to execute javascript or create html content
    by sending specially crafted web content.
    
    References
    ==========
    
    https://github.com/golang/go/issues/40928
    https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
    https://groups.google.com/g/golang-announce/c/8wqlSbkLdPs/m/UccMwBPUBAAJ
    https://github.com/golang/go/commit/eb07103a083237414145a45f029c873d57037e06
    https://security.archlinux.org/CVE-2020-24553
    

    LinuxSecurity Poll

    How are you contributing to Open Source?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /main-polls/37-how-are-you-contributing-to-open-source?task=poll.vote&format=json
    37
    radio
    [{"id":"127","title":"I'm involved with the development of an open-source project(s).","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"128","title":"I've reported vulnerabilities I've discovered in open-source code.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"129","title":"I've provided developers with feedback on their projects.","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"130","title":"I've helped another community member get started contributing to Open Source.","votes":"0","type":"x","order":"4","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.