-
Notifications
You must be signed in to change notification settings - Fork 202
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reflection needed on several critical security vulnerabilities #521
Comments
@Gaethje thx for the info, from what I can tell tool is not working properly. Most of the reported simply are false, also table headers are not visible here. |
Hi, as mentioned old Go runtime issues don't really apply here (we are now building with Go 1.20) and curl CVE-s are pretty much out of scope since it's tool for optional testing/debugging and isn't actively used. On top of it, it's a vulnerability that wasn't addressed by upstream base image provider (Alpine) yet, packages haven't been built. |
Hello @oktalz @dkorunic
|
We scanned your images with Jfrog’s xray image scanner. We found several critical vulnerabilities. Here are the critical vulnerabilities which are CVE >= 9.0, We appreciate your project and feedback.
<style> </style>CURLOPT_READFUNCTION
) to ask for data to send, even when theCURLOPT_POSTFIELDS
option has been set, if the same handle previously was used to issue aPUT
request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequentPOST
request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.CURLOPT_READFUNCTION
) to ask for data to send, even when theCURLOPT_POSTFIELDS
option has been set, if the same handle previously was used to issue aPUT
request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequentPOST
request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.CURLOPT_READFUNCTION
) to ask for data to send, even when theCURLOPT_POSTFIELDS
option has been set, if the same handle previously was used to issue aPUT
request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequentPOST
request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.CURLOPT_READFUNCTION
) to ask for data to send, even when theCURLOPT_POSTFIELDS
option has been set, if the same handle previously was used to issue aPUT
request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequentPOST
request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.The text was updated successfully, but these errors were encountered: