Skip to content

Commit 7221410

Browse files
data/reports: add GO-2025-3955
- data/reports/GO-2025-3955.yaml Fixes #3955 Change-Id: I36d3fe8aaaec7a1aab7426d2acebd29bdfe5d254 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/705916 Reviewed-by: Roland Shoemaker <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]> Auto-Submit: Ethan Lee <[email protected]>
1 parent 9eaa78d commit 7221410

File tree

3 files changed

+158
-0
lines changed

3 files changed

+158
-0
lines changed

data/cve/v5/GO-2025-3955.json

Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
{
2+
"dataType": "CVE_RECORD",
3+
"dataVersion": "5.0",
4+
"cveMetadata": {
5+
"cveId": "CVE-2025-47910"
6+
},
7+
"containers": {
8+
"cna": {
9+
"providerMetadata": {
10+
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
11+
},
12+
"title": "CrossOriginProtection insecure bypass patterns not limited to exact matches in net/http",
13+
"descriptions": [
14+
{
15+
"lang": "en",
16+
"value": "When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections."
17+
}
18+
],
19+
"affected": [
20+
{
21+
"vendor": "Go standard library",
22+
"product": "net/http",
23+
"collectionURL": "https://pkg.go.dev",
24+
"packageName": "net/http",
25+
"versions": [
26+
{
27+
"version": "1.25.0",
28+
"lessThan": "1.25.1",
29+
"status": "affected",
30+
"versionType": "semver"
31+
}
32+
],
33+
"programRoutines": [
34+
{
35+
"name": "CrossOriginProtection.AddInsecureBypassPattern"
36+
}
37+
],
38+
"defaultStatus": "unaffected"
39+
}
40+
],
41+
"problemTypes": [
42+
{
43+
"descriptions": [
44+
{
45+
"lang": "en",
46+
"description": "CWE-284: Improper Access Control"
47+
}
48+
]
49+
}
50+
],
51+
"references": [
52+
{
53+
"url": "https://go.dev/cl/699275"
54+
},
55+
{
56+
"url": "https://go.dev/issue/75054"
57+
},
58+
{
59+
"url": "https://groups.google.com/g/golang-announce/c/PtW9VW21NPs/m/DJhMQ-m5AQAJ"
60+
},
61+
{
62+
"url": "https://pkg.go.dev/vuln/GO-2025-3955"
63+
}
64+
]
65+
}
66+
}
67+
}

data/osv/GO-2025-3955.json

Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2025-3955",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2025-47910",
8+
"CVE-2025-47910"
9+
],
10+
"summary": "CrossOriginProtection insecure bypass patterns not limited to exact matches in net/http",
11+
"details": "When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "stdlib",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "1.25.0"
24+
},
25+
{
26+
"fixed": "1.25.1"
27+
}
28+
]
29+
}
30+
],
31+
"ecosystem_specific": {
32+
"imports": [
33+
{
34+
"path": "net/http",
35+
"symbols": [
36+
"CrossOriginProtection.AddInsecureBypassPattern"
37+
]
38+
}
39+
]
40+
}
41+
}
42+
],
43+
"references": [
44+
{
45+
"type": "FIX",
46+
"url": "https://go.dev/cl/699275"
47+
},
48+
{
49+
"type": "REPORT",
50+
"url": "https://go.dev/issue/75054"
51+
},
52+
{
53+
"type": "WEB",
54+
"url": "https://groups.google.com/g/golang-announce/c/PtW9VW21NPs/m/DJhMQ-m5AQAJ"
55+
}
56+
],
57+
"database_specific": {
58+
"url": "https://pkg.go.dev/vuln/GO-2025-3955",
59+
"review_status": "REVIEWED"
60+
}
61+
}

data/reports/GO-2025-3955.yaml

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
id: GO-2025-3955
2+
modules:
3+
- module: std
4+
versions:
5+
- introduced: 1.25.0
6+
- fixed: 1.25.1
7+
vulnerable_at: 1.25.0
8+
packages:
9+
- package: net/http
10+
symbols:
11+
- CrossOriginProtection.AddInsecureBypassPattern
12+
summary: CrossOriginProtection insecure bypass patterns not limited to exact matches in net/http
13+
description: |-
14+
When using http.CrossOriginProtection, the AddInsecureBypassPattern method can
15+
unexpectedly bypass more requests than intended. CrossOriginProtection then
16+
skips validation, but forwards the original request path, which may be served by
17+
a different handler without the intended security protections.
18+
cves:
19+
- CVE-2025-47910
20+
references:
21+
- fix: https://go.dev/cl/699275
22+
- report: https://go.dev/issue/75054
23+
- web: https://groups.google.com/g/golang-announce/c/PtW9VW21NPs/m/DJhMQ-m5AQAJ
24+
cve_metadata:
25+
id: CVE-2025-47910
26+
cwe: 'CWE-284: Improper Access Control'
27+
source:
28+
id: go-security-team
29+
created: 2025-09-22T18:22:01.351822759Z
30+
review_status: REVIEWED

0 commit comments

Comments
 (0)