Lucene search

K
f5F5F5:K000138679
HistoryFeb 21, 2024 - 12:00 a.m.

K000138679 : GoLang vulnerabilities CVE-2023-24540, CVE-2023-29400, and CVE-2023-29403

2024-02-2100:00:00
my.f5.com
21
golang
vulnerabilities
cve-2023-24540
cve-2023-29400
cve-2023-29403
javascript
html
injection
go runtime
unix

8.4 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

65.7%

Security Advisory Description

Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set “\t\n\f\r\u0020\u2028\u2029” in JavaScript contexts that also contain actions may not be properly sanitized during execution.

Templates containing actions in unquoted HTML attributes (e.g. “attr={{.}}”) executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.

On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.

Impact

There is no impact; F5 products are not affected by these vulnerabilities.