QID 375831

Date Published: 2021-09-08

QID 375831: Golang Improper Input Validation Of Octal Literals Vulnerability

Go is an open-source programming language that makes it easy to build simple, reliable, and efficient software.

Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.

Affected versions:
Golang versions prior to 1.17

QID Detection Logic:
This QID detects vulnerable versions of Golang with 'go version' command.

Successful exploitation of these vulnerabilities allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many programs that rely on golang builtin net.ParseCIDR function

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    The Vendor has released a security update to fix the vulnerability. For more information please visit Golang 1.17
    Vendor References

    CVEs related to QID 375831

    Software Advisories
    Advisory ID Software Component Link
    Go 1.17 URL Logo golang.org/doc/go1.17