All the vulnerabilites related to golang.org/x/net - golang.org/x/net/html
cve-2024-45338
Vulnerability from cvelistv5
Published
2024-12-18 20:38
Modified
2025-02-21 18:03
Severity ?
EPSS score ?
Summary
Non-linear parsing of case-insensitive content in golang.org/x/net/html
References
Impacted products
▼ | Vendor | Product |
---|---|---|
golang.org/x/net | golang.org/x/net/html |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-45338", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-31T19:51:42.228627Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1333", "description": "CWE-1333 Inefficient Regular Expression Complexity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-31T19:55:04.864Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-02-21T18:03:32.301Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://security.netapp.com/advisory/ntap-20250221-0001/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://pkg.go.dev", "defaultStatus": "unaffected", "packageName": "golang.org/x/net/html", "product": "golang.org/x/net/html", "programRoutines": [ { "name": "parseDoctype" }, { "name": "htmlIntegrationPoint" }, { "name": "inTableIM" }, { "name": "inBodyIM" }, { "name": "Parse" }, { "name": "ParseFragment" }, { "name": "ParseFragmentWithOptions" }, { "name": "ParseWithOptions" } ], "vendor": "golang.org/x/net", "versions": [ { "lessThan": "0.33.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "value": "Guido Vranken" } ], "descriptions": [ { "lang": "en", "value": "An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-405: Asymmetric Resource Consumption (Amplification)", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-18T20:38:22.660Z", "orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc", "shortName": "Go" }, "references": [ { "url": "https://go.dev/cl/637536" }, { "url": "https://go.dev/issue/70906" }, { "url": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ" }, { "url": "https://pkg.go.dev/vuln/GO-2024-3333" } ], "title": "Non-linear parsing of case-insensitive content in golang.org/x/net/html" } }, "cveMetadata": { "assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc", "assignerShortName": "Go", "cveId": "CVE-2024-45338", "datePublished": "2024-12-18T20:38:22.660Z", "dateReserved": "2024-08-27T19:41:58.555Z", "dateUpdated": "2025-02-21T18:03:32.301Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-22872
Vulnerability from cvelistv5
Published
2025-04-16 17:13
Modified
2025-04-16 20:15
Severity ?
EPSS score ?
Summary
Incorrect Neutralization of Input During Web Page Generation in x/net in golang.org/x/net
References
Impacted products
▼ | Vendor | Product |
---|---|---|
golang.org/x/net | golang.org/x/net/html |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-22872", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-16T20:14:29.607584Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-16T20:15:13.433Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://pkg.go.dev", "defaultStatus": "unaffected", "packageName": "golang.org/x/net/html", "product": "golang.org/x/net/html", "programRoutines": [ { "name": "Tokenizer.readStartTag" }, { "name": "Parse" }, { "name": "ParseFragment" }, { "name": "ParseFragmentWithOptions" }, { "name": "ParseWithOptions" }, { "name": "Tokenizer.Next" } ], "vendor": "golang.org/x/net", "versions": [ { "lessThan": "0.38.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "value": "Sean Ng (https://ensy.zip)" } ], "descriptions": [ { "lang": "en", "value": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts)." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-79", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-16T17:13:02.550Z", "orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc", "shortName": "Go" }, "references": [ { "url": "https://go.dev/cl/662715" }, { "url": "https://go.dev/issue/73070" }, { "url": "https://groups.google.com/g/golang-announce/c/ezSKR9vqbqA" }, { "url": "https://pkg.go.dev/vuln/GO-2025-3595" } ], "title": "Incorrect Neutralization of Input During Web Page Generation in x/net in golang.org/x/net" } }, "cveMetadata": { "assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc", "assignerShortName": "Go", "cveId": "CVE-2025-22872", "datePublished": "2025-04-16T17:13:02.550Z", "dateReserved": "2025-01-08T19:11:42.834Z", "dateUpdated": "2025-04-16T20:15:13.433Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3978
Vulnerability from cvelistv5
Published
2023-08-02 19:48
Modified
2024-09-27 21:57
Severity ?
EPSS score ?
Summary
Improper rendering of text nodes in golang.org/x/net/html
References
Impacted products
▼ | Vendor | Product |
---|---|---|
golang.org/x/net | golang.org/x/net/html |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:08:50.711Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://go.dev/issue/61615" }, { "tags": [ "x_transferred" ], "url": "https://go.dev/cl/514896" }, { "tags": [ "x_transferred" ], "url": "https://pkg.go.dev/vuln/GO-2023-1988" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-3978", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-27T21:49:56.220204Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-27T21:57:51.807Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://pkg.go.dev", "defaultStatus": "unaffected", "packageName": "golang.org/x/net/html", "product": "golang.org/x/net/html", "programRoutines": [ { "name": "render1" }, { "name": "Render" } ], "vendor": "golang.org/x/net", "versions": [ { "lessThan": "0.13.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-02T19:48:56.676Z", "orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc", "shortName": "Go" }, "references": [ { "url": "https://go.dev/issue/61615" }, { "url": "https://go.dev/cl/514896" }, { "url": "https://pkg.go.dev/vuln/GO-2023-1988" } ], "title": "Improper rendering of text nodes in golang.org/x/net/html" } }, "cveMetadata": { "assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc", "assignerShortName": "Go", "cveId": "CVE-2023-3978", "datePublished": "2023-08-02T19:48:56.676Z", "dateReserved": "2023-07-27T17:05:38.856Z", "dateUpdated": "2024-09-27T21:57:51.807Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }