logo

CVE-2024-45258 github.com/imroc/req/v3

Package

Manager: go
Name: github.com/imroc/req/v3
Vulnerable Version: >=0 <3.43.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

EPSS: 0.00086 pctl0.25742

Details

req may send an unintended request when a malformed URL is provided The `req` library is a widely used HTTP library in Go. However, it does not handle malformed URLs effectively. As a result, after parsing a malformed URL, the library may send HTTP requests to unexpected destinations, potentially leading to security vulnerabilities or unintended behavior in applications relying on this library for handling HTTP requests. Despite developers potentially utilizing the `net/url` library to parse malformed URLs and implement blocklists to prevent HTTP requests to listed URLs, inconsistencies exist between how the `net/url` and `req` libraries parse URLs. These discrepancies can lead to the failure of defensive strategies, resulting in potential security threats such as Server-Side Request Forgery (SSRF) and Remote Code Execution (RCE).

Metadata

Created: 2024-08-26T00:30:54Z
Modified: 2024-11-18T16:27:07Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/08/GHSA-cj55-gc7m-wvcq/GHSA-cj55-gc7m-wvcq.json
CWE IDs: ["CWE-20", "CWE-918", "CWE-94"]
Alternative ID: GHSA-cj55-gc7m-wvcq
Finding: F184
Auto approve: 1