Skip to content

Commit a3adcec

Browse files
tatianabgopherbot
authored andcommitted
data/reports: add 2 unreviewed reports
- data/reports/GO-2025-3371.yaml - data/reports/GO-2025-3374.yaml Fixes #3371 Fixes #3374 Change-Id: I599258340cc9152f54d07cd92262a32d79c3e84b Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/641495 Reviewed-by: Damien Neil <dneil@google.com> Auto-Submit: Tatiana Bradley <tatianabradley@google.com> LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Reviewed-by: Zvonimir Pavlinovic <zpavlinovic@google.com>
1 parent cf104cd commit a3adcec

File tree

4 files changed

+146
-0
lines changed

4 files changed

+146
-0
lines changed

data/osv/GO-2025-3371.json

+58
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2025-3371",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"GHSA-2r2v-9pf8-6342"
8+
],
9+
"summary": "WireGuard Portal v2 Vulnerable to OAuth Insecure Redirect URI / Account Takeover in github.com/h44z/wg-portal",
10+
"details": "WireGuard Portal v2 Vulnerable to OAuth Insecure Redirect URI / Account Takeover in github.com/h44z/wg-portal.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/h44z/wg-portal from v2.0.0-alpha.1 before v2.0.0-alpha.3.",
11+
"affected": [
12+
{
13+
"package": {
14+
"name": "github.com/h44z/wg-portal",
15+
"ecosystem": "Go"
16+
},
17+
"ranges": [
18+
{
19+
"type": "SEMVER",
20+
"events": [
21+
{
22+
"introduced": "0"
23+
}
24+
]
25+
}
26+
],
27+
"ecosystem_specific": {
28+
"custom_ranges": [
29+
{
30+
"type": "ECOSYSTEM",
31+
"events": [
32+
{
33+
"introduced": "2.0.0-alpha.1"
34+
},
35+
{
36+
"fixed": "2.0.0-alpha.3"
37+
}
38+
]
39+
}
40+
]
41+
}
42+
}
43+
],
44+
"references": [
45+
{
46+
"type": "ADVISORY",
47+
"url": "https://github.com/h44z/wg-portal/security/advisories/GHSA-2r2v-9pf8-6342"
48+
},
49+
{
50+
"type": "FIX",
51+
"url": "https://github.com/h44z/wg-portal/commit/62dbdfe0f96045d46e121d509fc181fbb7936895"
52+
}
53+
],
54+
"database_specific": {
55+
"url": "https://pkg.go.dev/vuln/GO-2025-3371",
56+
"review_status": "UNREVIEWED"
57+
}
58+
}

data/osv/GO-2025-3374.json

+52
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2025-3374",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2025-22130",
8+
"GHSA-j4jw-m6xr-fv6c"
9+
],
10+
"summary": "Soft Serve vulnerable to path traversal attacks in github.com/charmbracelet/soft-serve",
11+
"details": "Soft Serve vulnerable to path traversal attacks in github.com/charmbracelet/soft-serve",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/charmbracelet/soft-serve",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "0.8.2"
27+
}
28+
]
29+
}
30+
],
31+
"ecosystem_specific": {}
32+
}
33+
],
34+
"references": [
35+
{
36+
"type": "ADVISORY",
37+
"url": "https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-j4jw-m6xr-fv6c"
38+
},
39+
{
40+
"type": "FIX",
41+
"url": "https://github.com/charmbracelet/soft-serve/commit/a8d1bf3f9349c138383b65079b7b8ad97fff78f4"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/charmbracelet/soft-serve/releases/tag/v0.8.2"
46+
}
47+
],
48+
"database_specific": {
49+
"url": "https://pkg.go.dev/vuln/GO-2025-3374",
50+
"review_status": "UNREVIEWED"
51+
}
52+
}

data/reports/GO-2025-3371.yaml

+17
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
id: GO-2025-3371
2+
modules:
3+
- module: github.com/h44z/wg-portal
4+
non_go_versions:
5+
- introduced: 2.0.0-alpha.1
6+
- fixed: 2.0.0-alpha.3
7+
vulnerable_at: 1.0.19
8+
summary: WireGuard Portal v2 Vulnerable to OAuth Insecure Redirect URI / Account Takeover in github.com/h44z/wg-portal
9+
ghsas:
10+
- GHSA-2r2v-9pf8-6342
11+
references:
12+
- advisory: https://github.com/h44z/wg-portal/security/advisories/GHSA-2r2v-9pf8-6342
13+
- fix: https://github.com/h44z/wg-portal/commit/62dbdfe0f96045d46e121d509fc181fbb7936895
14+
source:
15+
id: GHSA-2r2v-9pf8-6342
16+
created: 2025-01-08T08:41:43.731247-10:00
17+
review_status: UNREVIEWED

data/reports/GO-2025-3374.yaml

+19
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
id: GO-2025-3374
2+
modules:
3+
- module: github.com/charmbracelet/soft-serve
4+
versions:
5+
- fixed: 0.8.2
6+
vulnerable_at: 0.8.1
7+
summary: Soft Serve vulnerable to path traversal attacks in github.com/charmbracelet/soft-serve
8+
cves:
9+
- CVE-2025-22130
10+
ghsas:
11+
- GHSA-j4jw-m6xr-fv6c
12+
references:
13+
- advisory: https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-j4jw-m6xr-fv6c
14+
- fix: https://github.com/charmbracelet/soft-serve/commit/a8d1bf3f9349c138383b65079b7b8ad97fff78f4
15+
- web: https://github.com/charmbracelet/soft-serve/releases/tag/v0.8.2
16+
source:
17+
id: GHSA-j4jw-m6xr-fv6c
18+
created: 2025-01-08T08:41:22.954732-10:00
19+
review_status: UNREVIEWED

0 commit comments

Comments
 (0)