CVE-2024-28110
ADVISORY - githubSummary
Impact
What kind of vulnerability is it? Who is impacted? Using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints.
The relevant code is here (also inline, emphasis added):
if p.Client == nil {
p.Client = **http.DefaultClient**
}
if p.roundTripper != nil {
p.Client.**Transport = p.roundTripper**
}
When the transport is populated with an authenticated transport such as:
... then http.DefaultClient is modified with the authenticated transport and will start to send Authorization tokens to any endpoint it is used to contact!
Found and patched by: @tcnghia and @mattmoor
Patches
v.2.15.2
Common Weakness Enumeration (CWE)
Insufficiently Protected Credentials
Insufficiently Protected Credentials
NIST
3.9
CVSS SCORE
7.5highGitHub
-
CVSS SCORE
N/AmediumGoLang
-
Red Hat
2.8
CVSS SCORE
6.5mediumChainguard
CGA-8m28-xmv8-j65x
-
Chainguard
CGA-cm36-jg7g-qprw
-
Chainguard
CGA-h36w-39g6-9pq5
-
Chainguard
CGA-hm7v-mrf7-g6w4
-
Chainguard
CGA-m3g5-hcj7-2424
-
Chainguard
CGA-mvh6-3mgc-hq8w
-
Chainguard
CGA-q4fm-5q64-q6wq
-
Chainguard
CGA-qpwf-xq36-4jqx
-
Chainguard
CGA-wqw6-h93j-xqrg
-
Chainguard
CGA-xcp2-ccxj-jj35
-