We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
go-restful: Authorization Bypass Through User-Controlled Key
Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3.8.0.
CRITICAL
https://avd.aquasec.com/nvd/cve-2022-1996
The text was updated successfully, but these errors were encountered:
just for information:
$ go mod why github.com/emicklei/go-restful # github.com/emicklei/go-restful github.com/aquasecurity/trivy/pkg/k8s/commands github.com/aquasecurity/trivy-kubernetes/pkg/k8s k8s.io/cli-runtime/pkg/genericclioptions k8s.io/client-go/discovery k8s.io/client-go/openapi k8s.io/kube-openapi/pkg/handler3 k8s.io/kube-openapi/pkg/common github.com/emicklei/go-restful
Sorry, something went wrong.
@DmitriyLewen Could you look into it?
Has this been fixed in version 0.30.0?
We're waiting for this PR. aquasecurity/trivy-kubernetes#57
DmitriyLewen
Successfully merging a pull request may close this issue.
Title
go-restful: Authorization Bypass Through User-Controlled Key
Description
Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3.8.0.
Severity
CRITICAL
Primary URL
https://avd.aquasec.com/nvd/cve-2022-1996
References
The text was updated successfully, but these errors were encountered: