Go 跨站脚本漏洞

admin 2024-01-15 10:28:22 YS 来源:ZONE.CI 全球网 0 阅读模式
> Go 跨站脚本漏洞

Go 跨站脚本漏洞

CNNVD-ID编号 CNNVD-202009-099 CVE编号 CVE-2020-24553
发布时间 2020-09-02 更新时间 2021-01-18
漏洞类型 跨站脚本 漏洞来源 N/A
危险等级 中危 威胁类型 远程
厂商 N/A

漏洞介绍

Golang是美国谷歌(Google)的一种静态强类型、编译型语言。Go的语法接近C语言,但对于变量的声明有所不同。Go支持垃圾回收功能。Go的并行模型是以东尼·霍尔的通信顺序进程(CSP)为基础,采取类似模型的其他语言包括Occam和Limbo,但它也具有Pi运算的特征,比如通道传输。在1.8版本中开放插件(Plugin)的支持,这意味着现在能从Go中动态加载部分函数。

Go 1.14.8版本和1.15.1版本及之前1.15.x版本中存在跨站脚本漏洞,该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。

漏洞补丁

目前厂商已发布升级了Go 跨站脚本漏洞的补丁,Go 跨站脚本漏洞的补丁获取链接:

参考网址

来源:MISC

链接:https://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html

来源:FULLDISC

链接:http://seclists.org/fulldisclosure/2020/Sep/5

来源:MISC

链接:https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html

来源:CONFIRM

链接:https://security.netapp.com/advisory/ntap-20200924-0003/

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160961/Red-Hat-Security-Advisory-2021-0146-01.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160955/Red-Hat-Security-Advisory-2021-0145-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4442/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4297/

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2020-24553

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-insights-is-affected-by-multiple-vulnerabilities-2/

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/Go-Cross-Site-Scripting-via-CGI-FCGI-handlers-33445

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-upgrade-to-ibp-v2-5-1-to-address-recent-concerns-issues-with-golang-versions-other-than-1-14-7/

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-watson-discovery-for-ibm-cloud-pak-for-data-affected-by-vulnerability-in-go-2/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-a-security-vulnerability-in-go-affects-ibm-cloud-automation-manager-3/

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-a-security-vulnerability-in-golang-go-affects-ibm-cloud-pak-for-multicloud-management-managed-service/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160526/Red-Hat-Security-Advisory-2020-5493-01.html

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-affect-ibm-cloud-pak-for-data-golang-cve-2020-24553/

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202009-099

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0