Vulnerability Report: GO-2024-2853
- CVE-2024-35175, GHSA-4w53-6jvp-gg52
- Affects: github.com/tg123/sshpiper
- Published: Jun 04, 2024
- Unreviewed
sshpiper's enabling of proxy protocol without proper feature flagging allows faking source address in github.com/tg123/sshpiper
For detailed information about this vulnerability, visit https://github.com/tg123/sshpiper/security/advisories/GHSA-4w53-6jvp-gg52 or https://nvd.nist.gov/vuln/detail/CVE-2024-35175.
Affected Modules
-
PathGo Versions
-
from v1.0.50 before v1.3.0
Aliases
References
- https://github.com/tg123/sshpiper/security/advisories/GHSA-4w53-6jvp-gg52
- https://nvd.nist.gov/vuln/detail/CVE-2024-35175
- https://github.com/tg123/sshpiper/commit/2ddd69876a1e1119059debc59fe869cb4e754430
- https://github.com/tg123/sshpiper/commit/70fb830dca26bea7ced772ce5d834a3e88ae7f53
- https://vuln.go.dev/ID/GO-2024-2853.json
Feedback
This report is unreviewed. It was automatically generated from a third-party source and its details have not been verified by the Go team.
See anything missing or incorrect?
Suggest an edit to this report.