Risk | High |
Patch available | YES |
Number of vulnerabilities | 11 |
CVE-ID | CVE-2023-24531 CVE-2023-24538 CVE-2023-29402 CVE-2023-29403 CVE-2023-29405 CVE-2023-29406 CVE-2023-39318 CVE-2023-39319 CVE-2023-39325 CVE-2024-24785 CVE-2023-29404 |
CWE-ID | CWE-78 CWE-94 CWE-264 CWE-644 CWE-79 CWE-400 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system golang-1.17-src (Ubuntu package) Operating systems & Components / Operating system package or component golang-1.17-go (Ubuntu package) Operating systems & Components / Operating system package or component golang-1.17 (Ubuntu package) Operating systems & Components / Operating system package or component |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 11 vulnerabilities.
EUVDB-ID: #VU101963
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-24531
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a local user to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation when handling output of environment variables. A local user can execute arbitrary commands on the system by setting specially crafted values to environment variables and making "go env" print them out.
MitigationUpdate the affected package golang-1.17 to the latest version.
Vulnerable software versionsUbuntu: 22.04
golang-1.17-src (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17-go (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17 (Ubuntu package): before 1.17.13-3ubuntu1.2
CPE2.3https://ubuntu.com/security/notices/USN-7061-1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU74574
Risk: High
CVSSv4.0: 8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-24538
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation in html/template when handling JavaScript templates that contain backticks in code. If a template contains a Go template action within a JavaScript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary JavaScript code into the Go template.
MitigationUpdate the affected package golang-1.17 to the latest version.
Vulnerable software versionsUbuntu: 22.04
golang-1.17-src (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17-go (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17 (Ubuntu package): before 1.17.13-3ubuntu1.2
CPE2.3https://ubuntu.com/security/notices/USN-7061-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU77528
Risk: Medium
CVSSv4.0: 4.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-29402
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation within the cgo go command when building code that contains directories with newline characters in their names. A remote attacker can pass specially crafted input to the cgo command at build time and potentially compromise the system.
Modules which are retrieved using the go command, i.e. via "go get", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected).
MitigationUpdate the affected package golang-1.17 to the latest version.
Vulnerable software versionsUbuntu: 22.04
golang-1.17-src (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17-go (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17 (Ubuntu package): before 1.17.13-3ubuntu1.2
CPE2.3https://ubuntu.com/security/notices/USN-7061-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU77529
Risk: Medium
CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-29403
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists within Go runtime due to application allows to execute setuid/setgid binaries without any restrictions. An attacker with ability to control the application flow can execute arbitrary code on the system with elevated privileges.
Update the affected package golang-1.17 to the latest version.
Vulnerable software versionsUbuntu: 22.04
golang-1.17-src (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17-go (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17 (Ubuntu package): before 1.17.13-3ubuntu1.2
CPE2.3https://ubuntu.com/security/notices/USN-7061-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU77531
Risk: Medium
CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-29405
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
Update the affected package golang-1.17 to the latest version.
Vulnerable software versionsUbuntu: 22.04
golang-1.17-src (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17-go (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17 (Ubuntu package): before 1.17.13-3ubuntu1.2
CPE2.3https://ubuntu.com/security/notices/USN-7061-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU78327
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-29406
CWE-ID:
CWE-644 - Improper Neutralization of HTTP Headers for Scripting Syntax
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to improper input validation in HTTP/1 client when handling HTTP Host header. A remote non-authenticated attacker can send a specially crafted HTTP request with a maliciously crafted Host header and inject additional headers or entire requests.
Successful exploitation of the vulnerability may allow an attacker to perform cross-site scripting, cache poisoning or session hijacking attacks.
MitigationUpdate the affected package golang-1.17 to the latest version.
Vulnerable software versionsUbuntu: 22.04
golang-1.17-src (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17-go (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17 (Ubuntu package): before 1.17.13-3ubuntu1.2
CPE2.3https://ubuntu.com/security/notices/USN-7061-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80572
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-39318
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data within the html/template package when handling HMTL-like "<!--" and "-->" comment tokens, nor hashbang "#!" comment tokens, in <script> contexts. A remote attacker can pass specially crafted input to the application and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
MitigationUpdate the affected package golang-1.17 to the latest version.
Vulnerable software versionsUbuntu: 22.04
golang-1.17-src (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17-go (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17 (Ubuntu package): before 1.17.13-3ubuntu1.2
CPE2.3https://ubuntu.com/security/notices/USN-7061-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80573
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-39319
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists within the html/template package caused by improperly applied rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. A remote attacker can pass specially crafted input to the application and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
MitigationUpdate the affected package golang-1.17 to the latest version.
Vulnerable software versionsUbuntu: 22.04
golang-1.17-src (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17-go (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17 (Ubuntu package): before 1.17.13-3ubuntu1.2
CPE2.3https://ubuntu.com/security/notices/USN-7061-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82064
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-39325
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to excessive consumption of internal resources when handling HTTP/2 requests. A remote attacker can bypass the http2.Server.MaxConcurrentStreams setting by creating new connections while the current connections are still being processed, trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationUpdate the affected package golang-1.17 to the latest version.
Vulnerable software versionsUbuntu: 22.04
golang-1.17-src (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17-go (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17 (Ubuntu package): before 1.17.13-3ubuntu1.2
CPE2.3https://ubuntu.com/security/notices/USN-7061-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU87200
Risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-24785
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in html/template when parsing errors returned from MarshalJSON methods. A remote attacker can execute arbitrary HTML and script code in user's browser in context of vulnerable website.
MitigationUpdate the affected package golang-1.17 to the latest version.
Vulnerable software versionsUbuntu: 22.04
golang-1.17-src (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17-go (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17 (Ubuntu package): before 1.17.13-3ubuntu1.2
CPE2.3https://ubuntu.com/security/notices/USN-7061-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU77530
Risk: Medium
CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-29404
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the affected system.
Update the affected package golang-1.17 to the latest version.
Vulnerable software versionsUbuntu: 22.04
golang-1.17-src (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17-go (Ubuntu package): before 1.17.13-3ubuntu1.2
golang-1.17 (Ubuntu package): before 1.17.13-3ubuntu1.2
CPE2.3https://ubuntu.com/security/notices/USN-7061-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.