QID 375831
Date Published: 2021-09-08
QID 375831: Golang Improper Input Validation Of Octal Literals Vulnerability
Go is an open-source programming language that makes it easy to build simple, reliable, and efficient software.
Go before 1.17 does not properly consider extraneous zero characters at the beginning of an IP address octet, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation. This affects net.ParseIP and net.ParseCIDR.
Affected versions:
Golang versions prior to 1.17
QID Detection Logic:
This QID detects vulnerable versions of Golang with 'go version' command.
Successful exploitation of these vulnerabilities allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many programs that rely on golang builtin net.ParseCIDR function
- Golang Security Advisory -
github.com/golang/go/issues/43389
CVEs related to QID 375831
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| Go 1.17 |
|