We found results for “”
CVE-2022-26945
Good to know:
Date: May 25, 2022
go-getter up to 1.5.11 and 2.0.2 allowed protocol switching, endless redirect, and configuration bypass via abuse of custom HTTP response header processing. Fixed in 1.6.1 and 2.1.0. After conducting further research, Mend has determined that all versions of go-getter up to version v1.6.0 and v2.1.0 are vulnerable to CVE-2022-26945.
Language: Go
Severity Score
Related Resources (13)
Severity Score
Weakness Type (CWE)
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-77Insufficient Information
NVD-CWE-noinfoTop Fix
Upgrade Version
Upgrade to version github.com/hashicorp/go-getter - v1.6.1;github.com/hashicorp/go-getter - v2.1.0;github.com/hashicorp/go-getter/v2 - v2.1.0;github.com/hashicorp/go-getter/s3/v2 - v2.1.0;github.com/hashicorp/go-getter/gcs/v2 - v2.1.0
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
CVSS v2
| Base Score: |
|
|---|---|
| Access Vector (AV): | NETWORK |
| Access Complexity (AC): | LOW |
| Authentication (AU): | NONE |
| Confidentiality (C): | PARTIAL |
| Integrity (I): | PARTIAL |
| Availability (A): | PARTIAL |
| Additional information: |
Vulnerabilities
Projects
Contact Us


