ghsa-69ch-w2m2-3vjp
Vulnerability from github
Published
2022-10-14 19:00
Modified
2024-05-20 21:36
Severity ?
Summary
golang.org/x/text/language Denial of service via crafted Accept-Language header
Details
The BCP 47 tag parser has quadratic time complexity due to inherent aspects of its design. Since the parser is, by design, exposed to untrusted user input, this can be leveraged to force a program to consume significant time parsing Accept-Language headers. The parser cannot be easily rewritten to fix this behavior for various reasons. Instead the solution implemented in this CL is to limit the total complexity of tags passed into ParseAcceptLanguage by limiting the number of dashes in the string to 1000. This should be more than enough for the majority of real world use cases, where the number of tags being sent is likely to be in the single digits.
Specific Go Packages Affected
golang.org/x/text/language
{ "affected": [ { "package": { "ecosystem": "Go", "name": "golang.org/x/text" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.3.8" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-32149" ], "database_specific": { "cwe_ids": [ "CWE-772" ], "github_reviewed": true, "github_reviewed_at": "2022-10-28T20:11:26Z", "nvd_published_at": "2022-10-14T15:15:00Z", "severity": "HIGH" }, "details": "The BCP 47 tag parser has quadratic time complexity due to inherent aspects of its design. Since the parser is, by design, exposed to untrusted user input, this can be leveraged to force a program to consume significant time parsing Accept-Language headers. The parser cannot be easily rewritten to fix this behavior for various reasons. Instead the solution implemented in this CL is to limit the total complexity of tags passed into ParseAcceptLanguage by limiting the number of dashes in the string to 1000. This should be more than enough for the majority of real world use cases, where the number of tags being sent is likely to be in the single digits.\n\n### Specific Go Packages Affected\ngolang.org/x/text/language", "id": "GHSA-69ch-w2m2-3vjp", "modified": "2024-05-20T21:36:16Z", "published": "2022-10-14T19:00:40Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149" }, { "type": "WEB", "url": "https://github.com/golang/go/issues/56152" }, { "type": "WEB", "url": "https://github.com/golang/text/commit/434eadcdbc3b0256971992e8c70027278364c72c" }, { "type": "PACKAGE", "url": "https://github.com/golang/text" }, { "type": "WEB", "url": "https://go.dev/cl/442235" }, { "type": "WEB", "url": "https://go.dev/issue/56152" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ" }, { "type": "WEB", "url": "https://pkg.go.dev/vuln/GO-2022-1059" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ], "summary": "golang.org/x/text/language Denial of service via crafted Accept-Language header" }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.