logo

CVE-2020-26283 github.com/ipfs/go-ipfs

Package

Manager: go
Name: github.com/ipfs/go-ipfs
Vulnerable Version: >=0 <0.8.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00858 pctl0.7415

Details

Control character injection in console output in github.com/ipfs/go-ipfs ### Impact Control characters are not escaped from console output. This can result in hiding input from the user which could result in the user taking an unknown, malicious action. ### Patches <!-- _Has the problem been patched? What versions should users upgrade to?_ --> - Patched via https://github.com/ipfs/go-ipfs/pull/7831 in v0.8.0 ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ipfs](http://github.com/ipfs/go-ipfs) * Email us at [security@ipfs.io](mailto:security@ipfs.io)

Metadata

Created: 2021-06-23T17:27:27Z
Modified: 2021-05-21T18:06:39Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-r4gv-vj59-cccm/GHSA-r4gv-vj59-cccm.json
CWE IDs: ["CWE-116", "CWE-150"]
Alternative ID: GHSA-r4gv-vj59-cccm
Finding: F404
Auto approve: 1