Skip to content

Commit

Permalink
data/reports: add GO-2023-2386.yaml
Browse files Browse the repository at this point in the history
Aliases: CVE-2023-45292

Updates #2386

Change-Id: I3db92e9e5ca20f2abc7ede0bb52371f577cf70f9
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/548060
Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
Reviewed-by: Damien Neil <dneil@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
  • Loading branch information
tatianab authored and gopherbot committed Dec 8, 2023
1 parent 3d1b62a commit a5751d1
Show file tree
Hide file tree
Showing 3 changed files with 135 additions and 0 deletions.
59 changes: 59 additions & 0 deletions data/cve/v5/GO-2023-2386.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-45292"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"title": "Captcha verification bypass in github.com/mojocn/base64Captcha",
"descriptions": [
{
"lang": "en",
"value": "When using the default implementation of Verify to check a Captcha, verification can be bypassed. For example, if the first parameter is a non-existent id, the second parameter is an empty string, and the third parameter is true, the function will always consider the Captcha to be correct."
}
],
"affected": [
{
"vendor": "github.com/mojocn/base64Captcha",
"product": "github.com/mojocn/base64Captcha",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/mojocn/base64Captcha",
"programRoutines": [
{
"name": "memoryStore.Verify"
}
],
"defaultStatus": "affected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-305: Authentication Bypass by Primary Weakness"
}
]
}
],
"references": [
{
"url": "https://github.com/mojocn/base64Captcha/issues/120"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-2386"
}
],
"credits": [
{
"lang": "en",
"value": "@cangkuai"
}
]
}
}
}
53 changes: 53 additions & 0 deletions data/osv/GO-2023-2386.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,53 @@
{
"schema_version": "1.3.1",
"id": "GO-2023-2386",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-45292"
],
"summary": "Captcha verification bypass in github.com/mojocn/base64Captcha",
"details": "When using the default implementation of Verify to check a Captcha, verification can be bypassed.\n\nFor example, if the first parameter is a non-existent id, the second parameter is an empty string, and the third parameter is true, the function will always consider the Captcha to be correct.",
"affected": [
{
"package": {
"name": "github.com/mojocn/base64Captcha",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "0"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/mojocn/base64Captcha",
"symbols": [
"memoryStore.Verify"
]
}
]
}
}
],
"references": [
{
"type": "REPORT",
"url": "https://github.com/mojocn/base64Captcha/issues/120"
}
],
"credits": [
{
"name": "@cangkuai"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-2386"
}
}
23 changes: 23 additions & 0 deletions data/reports/GO-2023-2386.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
id: GO-2023-2386
modules:
- module: github.com/mojocn/base64Captcha
vulnerable_at: 1.3.5
packages:
- package: github.com/mojocn/base64Captcha
symbols:
- memoryStore.Verify
summary: Captcha verification bypass in github.com/mojocn/base64Captcha
description: |-
When using the default implementation of Verify to check a Captcha, verification
can be bypassed.
For example, if the first parameter is a non-existent id, the second parameter
is an empty string, and the third parameter is true, the function will always
consider the Captcha to be correct.
credits:
- '@cangkuai'
references:
- report: https://github.com/mojocn/base64Captcha/issues/120
cve_metadata:
id: CVE-2023-45292
cwe: 'CWE-305: Authentication Bypass by Primary Weakness'

0 comments on commit a5751d1

Please sign in to comment.