Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/mojocn/base64Captcha: CVE-2023-45292 #2386

Closed
1 task
cangkuai opened this issue Dec 6, 2023 · 8 comments
Closed
1 task

Comments

@cangkuai
Copy link

cangkuai commented Dec 6, 2023

Acknowledgement

  • The maintainer(s) of the affected project have already been made aware of this vulnerability.

Description

This is a Module that generates website Captcha. I found that some special values can bypass Captcha verification.
When using store.Verify() to verify whether the Captcha is correct, if the first parameter is a non-existent id, the second parameter is an empty string, and the third parameter is true, the function will always consider the Captcha to be correct.
Sample code:

package main

import (
	"fmt"
	"strconv"
	"testing"

	"github.com/mojocn/base64Captcha"
)

func TestCat(t *testing.T) {
	var store = base64Captcha.DefaultMemStore
	fmt.Println(strconv.FormatBool(store.Verify("dsad", "", true)))
}

Reproduction screenshot
Snipaste_2023-12-01_20-40-02
Snipaste_2023-12-01_20-41-02
(I blurred my name in the picture above.)

Affected Modules, Packages, Versions and Symbols

Module: github.com/mojocn/base64Captcha
Package: github.com/mojocn/base64Captcha
Versions:
  - Introduced: 1.3.5
Symbols:
  - store.Verify()

CVE/GHSA ID

No response

Fix Commit or Pull Request

No response

References

mojocn/base64Captcha#120

Additional information

I contacted the author via email and issue, but after 6 days there was still no feedback from the author.

@cangkuai
Copy link
Author

cangkuai commented Dec 7, 2023

Is it because my report is not detailed enough or is it difficult to understand?

@tatianab
Copy link
Contributor

tatianab commented Dec 7, 2023

Hello, thanks for your report. We are planning create an entry in the Go vulnerability database for this issue. It should be published today or tomorrow.

@tatianab tatianab changed the title x/vulndb: potential Go vuln in github.com/mojocn/base64Captcha x/vulndb: potential Go vuln in github.com/mojocn/base64Captcha: CVE-2023-45292 Dec 7, 2023
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/548060 mentions this issue: data/reports: add GO-2023-2386.yaml

@cangkuai
Copy link
Author

cangkuai commented Dec 7, 2023

Thank you very much for getting the CVE number so quickly.

gopherbot pushed a commit that referenced this issue Dec 8, 2023
Aliases: CVE-2023-45292

Updates #2386

Change-Id: I3db92e9e5ca20f2abc7ede0bb52371f577cf70f9
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/548060
Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
Reviewed-by: Damien Neil <dneil@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
@cangkuai
Copy link
Author

cangkuai commented Dec 9, 2023

This vulnerability is fixed in version 1.3.6
mojocn/base64Captcha@9b11012
mojocn/base64Captcha@5ab86bd

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/548755 mentions this issue: data/reports: update GO-2023-2386.yaml

gopherbot pushed a commit that referenced this issue Dec 11, 2023
Adds fixed version and commit links provided by reporter.

Aliases: CVE-2023-45292

Updates #2386

Change-Id: I8a7d08bd02bdbdfdb161f105a9324301a0e85396
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/548755
Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Reviewed-by: Damien Neil <dneil@google.com>
@tatianab
Copy link
Contributor

tatianab commented Dec 11, 2023

Thanks again for your report. This has been published (including the fix you referenced) as GO-2023-2386 and CVE-2023-45292

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/549595 mentions this issue: data/reports: update GO-2023-2386.yaml

gopherbot pushed a commit that referenced this issue Dec 14, 2023
Aliases: CVE-2023-45292, GHSA-5mmw-p5qv-w3x5

Updates #2386

Change-Id: I5d7e7d734d4f32339ff1bc23e078752f4122ab2f
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/549595
Run-TryBot: Tim King <taking@google.com>
Reviewed-by: Tatiana Bradley <tatianabradley@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants