Skip to content

Commit aeec1a2

Browse files
committed
data/reports: add GO-2022-1201.yaml
Aliases: CVE-2021-4294 Fixes #1201 Change-Id: I4c25d527b44634fa056982d25eb9406fb3e7a737 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/460415 Run-TryBot: Damien Neil <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Reviewed-by: Zvonimir Pavlinovic <[email protected]>
1 parent 708d76d commit aeec1a2

File tree

2 files changed

+78
-0
lines changed

2 files changed

+78
-0
lines changed

data/osv/GO-2022-1201.json

+57
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
{
2+
"id": "GO-2022-1201",
3+
"published": "0001-01-01T00:00:00Z",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"aliases": [
6+
"CVE-2021-4294"
7+
],
8+
"details": "Client secret checks are vulnerable to timing attacks, which could permit an attacker to determine client secrets.",
9+
"affected": [
10+
{
11+
"package": {
12+
"name": "github.com/openshift/osin",
13+
"ecosystem": "Go"
14+
},
15+
"ranges": [
16+
{
17+
"type": "SEMVER",
18+
"events": [
19+
{
20+
"introduced": "0"
21+
},
22+
{
23+
"fixed": "1.0.2-0.20210113124101-8612686d6dda"
24+
}
25+
]
26+
}
27+
],
28+
"database_specific": {
29+
"url": "https://pkg.go.dev/vuln/GO-2022-1201"
30+
},
31+
"ecosystem_specific": {
32+
"imports": [
33+
{
34+
"path": "github.com/openshift/osin",
35+
"symbols": [
36+
"CheckClientSecret",
37+
"DefaultClient.ClientSecretMatches",
38+
"Server.HandleAccessRequest",
39+
"Server.HandleAuthorizeRequest"
40+
]
41+
}
42+
]
43+
}
44+
}
45+
],
46+
"references": [
47+
{
48+
"type": "FIX",
49+
"url": "https://github.com/openshift/osin/pull/200"
50+
},
51+
{
52+
"type": "FIX",
53+
"url": "https://github.com/openshift/osin/commit/8612686d6dda34ae9ef6b5a974e4b7accb4fea29"
54+
}
55+
],
56+
"schema_version": "1.3.1"
57+
}

data/reports/GO-2022-1201.yaml

+21
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
modules:
2+
- module: github.com/openshift/osin
3+
versions:
4+
- fixed: 1.0.2-0.20210113124101-8612686d6dda
5+
vulnerable_at: 1.0.1
6+
packages:
7+
- package: github.com/openshift/osin
8+
symbols:
9+
- DefaultClient.ClientSecretMatches
10+
- CheckClientSecret
11+
derived_symbols:
12+
- Server.HandleAccessRequest
13+
- Server.HandleAuthorizeRequest
14+
description: |
15+
Client secret checks are vulnerable to timing attacks, which could
16+
permit an attacker to determine client secrets.
17+
cves:
18+
- CVE-2021-4294
19+
references:
20+
- fix: https://github.com/openshift/osin/pull/200
21+
- fix: https://github.com/openshift/osin/commit/8612686d6dda34ae9ef6b5a974e4b7accb4fea29

0 commit comments

Comments
 (0)