Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/hashicorp/boundary: GHSA-xx83-cxmq-x89m #3335

Closed
GoVulnBot opened this issue Dec 13, 2024 · 1 comment
Labels

Comments

@GoVulnBot
Copy link

Advisory GHSA-xx83-cxmq-x89m references a vulnerability in the following Go modules:

Module
github.com/hashicorp/boundary

Description:
Boundary Community Edition and Boundary Enterprise (“Boundary”) incorrectly handle HTTP requests during the initialization of the Boundary controller, which may cause the Boundary server to terminate prematurely. Boundary is only vulnerable to this flaw during the initialization of the Boundary controller, which on average is measured in milliseconds during the Boundary startup process.

This vulnerability, CVE-2024-12289, is fixed in Boundary Community Edition and Boundary Enterprise 0.16.4, 0.17.3, 0.18.2.

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/hashicorp/boundary
      versions:
        - fixed: 0.18.2
      vulnerable_at: 0.18.1
summary: |-
    Boundary Community Edition Incorrectly Handles HTTP Requests On Initialization
    Which May Lead to a Denial of Service in github.com/hashicorp/boundary
cves:
    - CVE-2024-12289
ghsas:
    - GHSA-xx83-cxmq-x89m
references:
    - advisory: https://github.com/advisories/GHSA-xx83-cxmq-x89m
    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-12289
    - web: https://discuss.hashicorp.com/t/hcsec-2024-28-boundary-controller-incorrectly-handles-http-requests-on-initialization-which-may-lead-to-a-denial-of-service
source:
    id: GHSA-xx83-cxmq-x89m
    created: 2024-12-13T21:02:31.383603356Z
review_status: UNREVIEWED

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/636717 mentions this issue: data/reports: add 6 unreviewed reports

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants