Vulnerability Details : CVE-2023-45285
Using go get to fetch a module with the ".git" suffix may unexpectedly fallback to the insecure "git://" protocol if the module is unavailable via the secure "https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off).
Products affected by CVE-2023-45285
- cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
- cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-45285
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 17 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-45285
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
References for CVE-2023-45285
-
https://go.dev/cl/540257
[release-branch.go1.21] cmd/go/internal/vcs: error out if the requested repo does not support a secure protocol (540257) · Gerrit Code ReviewPatch
-
https://pkg.go.dev/vuln/GO-2023-2383
GO-2023-2383 - Go PackagesPatch;Vendor Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIU6HOGV6RRIKWM57LOXQA75BGZSIH6G/
[SECURITY] Fedora 39 Update: golang-1.21.6-1.fc39 - package-announce - Fedora Mailing-Lists
-
https://groups.google.com/g/golang-dev/c/6ypN5EjibjM/m/KmLVYH_uAgAJ
[security] Go 1.21.5 and Go 1.20.12 are releasedMailing List;Vendor Advisory
-
https://go.dev/issue/63845
cmd/go: git VCS qualifier in module path uses git:// scheme · Issue #63845 · golang/go · GitHubIssue Tracking;Vendor Advisory
Jump to