OpenSUSE Linux update for go1.12

Published: 2019-08-25




Severity
Medium
Patch available
YES
Number of vulnerabilities
3
CVE ID
CVE-2019-14809CVE-2019-9512CVE-2019-9514
CWE ID
CWE-20CWE-400
Exploitation vector
Network
Public exploit
N/A
Vulnerable software
Opensuse Subscribe
Vendor
Novell

Security Advisory



1) Input validation error


Severity: Low


CVSSv3: 3.7 [CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]


CVE-ID: CVE-2019-14809


CWE-ID: CWE-20 - Improper Input Validation


Description

The vulnerability allows a remote attacker to bypass certain security restrictions.


The vulnerability exists due to incorrect processing of URLs in net/url, related to the Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. A remote attacker can create a crafted javascript:// URL that in certain situations can be used to bypass authorization checks for some applications. 


Mitigation

Update the affected packages.


Vulnerable software versions

Opensuse: 15.1


CPE
External links

https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html


Q & A


Can this vulnerability be exploited remotely?


Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.


Is there k ..

Support the originator by clicking the read the rest link below.