@fabasoad/sarif-to-slack 0.2.4 → 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.github/workflows/release.yml +1 -1
- package/.github/workflows/security.yml +0 -1
- package/.github/workflows/send-sarif-to-slack.yml +148 -76
- package/.gitleaksignore +8 -0
- package/.pre-commit-config.yaml +3 -3
- package/.tool-versions +1 -1
- package/dist/Logger.js +4 -1
- package/dist/SarifToSlackClient.d.ts +33 -0
- package/dist/SarifToSlackClient.d.ts.map +1 -0
- package/dist/SarifToSlackClient.js +178 -0
- package/dist/SlackMessageBuilder.js +34 -82
- package/dist/System.d.ts +2 -0
- package/dist/System.d.ts.map +1 -0
- package/dist/System.js +15 -0
- package/dist/index.cjs +843 -467
- package/dist/index.d.ts +35 -12
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +36 -12
- package/dist/model/Color.d.ts +70 -0
- package/dist/model/Color.d.ts.map +1 -0
- package/dist/model/Color.js +119 -0
- package/dist/model/Finding.d.ts +2 -0
- package/dist/model/Finding.d.ts.map +1 -0
- package/dist/model/Finding.js +93 -0
- package/dist/model/FindingsArray.d.ts +2 -0
- package/dist/model/FindingsArray.d.ts.map +1 -0
- package/dist/model/FindingsArray.js +24 -0
- package/dist/processors/CodeQLProcessor.d.ts +2 -0
- package/dist/processors/CodeQLProcessor.d.ts.map +1 -0
- package/dist/processors/CodeQLProcessor.js +17 -0
- package/dist/processors/CommonProcessor.d.ts +2 -0
- package/dist/processors/CommonProcessor.d.ts.map +1 -0
- package/dist/processors/CommonProcessor.js +84 -0
- package/dist/processors/ProcessorFactory.d.ts +2 -0
- package/dist/processors/ProcessorFactory.d.ts.map +1 -0
- package/dist/processors/ProcessorFactory.js +22 -0
- package/dist/processors/SnykProcessor.d.ts +2 -0
- package/dist/processors/SnykProcessor.d.ts.map +1 -0
- package/dist/processors/SnykProcessor.js +18 -0
- package/dist/representations/CompactGroupByRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupByRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupByRepresentation.js +58 -0
- package/dist/representations/CompactGroupByRunPerLevelRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupByRunPerLevelRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupByRunPerLevelRepresentation.js +13 -0
- package/dist/representations/CompactGroupByRunPerSeverityRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupByRunPerSeverityRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupByRunPerSeverityRepresentation.js +13 -0
- package/dist/representations/CompactGroupByRunRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupByRunRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupByRunRepresentation.js +39 -0
- package/dist/representations/CompactGroupBySarifPerLevelRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupBySarifPerLevelRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupBySarifPerLevelRepresentation.js +13 -0
- package/dist/representations/CompactGroupBySarifPerSeverityRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupBySarifPerSeverityRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupBySarifPerSeverityRepresentation.js +13 -0
- package/dist/representations/CompactGroupBySarifRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupBySarifRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupBySarifRepresentation.js +40 -0
- package/dist/representations/CompactGroupByToolNamePerLevelRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupByToolNamePerLevelRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupByToolNamePerLevelRepresentation.js +13 -0
- package/dist/representations/CompactGroupByToolNamePerSeverityRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupByToolNamePerSeverityRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupByToolNamePerSeverityRepresentation.js +13 -0
- package/dist/representations/CompactGroupByToolNameRepresentation.d.ts +2 -0
- package/dist/representations/CompactGroupByToolNameRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactGroupByToolNameRepresentation.js +39 -0
- package/dist/representations/CompactTotalPerLevelRepresentation.d.ts +2 -0
- package/dist/representations/CompactTotalPerLevelRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactTotalPerLevelRepresentation.js +13 -0
- package/dist/representations/CompactTotalPerSeverityRepresentation.d.ts +2 -0
- package/dist/representations/CompactTotalPerSeverityRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactTotalPerSeverityRepresentation.js +13 -0
- package/dist/representations/CompactTotalRepresentation.d.ts +2 -0
- package/dist/representations/CompactTotalRepresentation.d.ts.map +1 -0
- package/dist/representations/CompactTotalRepresentation.js +25 -0
- package/dist/representations/Representation.d.ts +2 -0
- package/dist/representations/Representation.d.ts.map +1 -0
- package/dist/representations/Representation.js +28 -0
- package/dist/representations/RepresentationFactory.d.ts +2 -0
- package/dist/representations/RepresentationFactory.d.ts.map +1 -0
- package/dist/representations/RepresentationFactory.js +37 -0
- package/dist/sarif-to-slack.d.ts +337 -85
- package/dist/tsdoc-metadata.json +1 -1
- package/dist/types.d.ts +215 -51
- package/dist/types.d.ts.map +1 -1
- package/dist/types.js +225 -33
- package/dist/utils/Comparators.d.ts +2 -0
- package/dist/utils/Comparators.d.ts.map +1 -0
- package/dist/utils/Comparators.js +18 -0
- package/dist/utils/ExtendedArray.d.ts +2 -0
- package/dist/utils/ExtendedArray.d.ts.map +1 -0
- package/dist/utils/ExtendedArray.js +11 -0
- package/dist/utils/FileUtils.d.ts +2 -0
- package/dist/utils/FileUtils.d.ts.map +1 -0
- package/dist/utils/FileUtils.js +51 -0
- package/dist/utils/SarifUtils.js +19 -53
- package/etc/sarif-to-slack.api.md +161 -99
- package/jest.config.json +2 -2
- package/package.json +9 -9
- package/scripts/save-metadata.sh +15 -0
- package/src/Logger.ts +4 -0
- package/src/SarifToSlackClient.ts +202 -0
- package/src/SlackMessageBuilder.ts +35 -115
- package/src/System.ts +16 -0
- package/src/index.ts +47 -20
- package/src/model/Color.ts +201 -0
- package/src/model/Finding.ts +137 -0
- package/src/model/FindingsArray.ts +27 -0
- package/src/processors/CodeQLProcessor.ts +19 -0
- package/src/processors/CommonProcessor.ts +103 -0
- package/src/processors/ProcessorFactory.ts +23 -0
- package/src/processors/SnykProcessor.ts +19 -0
- package/src/representations/CompactGroupByRepresentation.ts +67 -0
- package/src/representations/CompactGroupByRunPerLevelRepresentation.ts +14 -0
- package/src/representations/CompactGroupByRunPerSeverityRepresentation.ts +14 -0
- package/src/representations/CompactGroupByRunRepresentation.ts +44 -0
- package/src/representations/CompactGroupBySarifPerLevelRepresentation.ts +15 -0
- package/src/representations/CompactGroupBySarifPerSeverityRepresentation.ts +15 -0
- package/src/representations/CompactGroupBySarifRepresentation.ts +45 -0
- package/src/representations/CompactGroupByToolNamePerLevelRepresentation.ts +15 -0
- package/src/representations/CompactGroupByToolNamePerSeverityRepresentation.ts +15 -0
- package/src/representations/CompactGroupByToolNameRepresentation.ts +44 -0
- package/src/representations/CompactTotalPerLevelRepresentation.ts +14 -0
- package/src/representations/CompactTotalPerSeverityRepresentation.ts +14 -0
- package/src/representations/CompactTotalRepresentation.ts +27 -0
- package/src/representations/Representation.ts +35 -0
- package/src/representations/RepresentationFactory.ts +49 -0
- package/src/types.ts +270 -53
- package/src/utils/Comparators.ts +19 -0
- package/src/utils/ExtendedArray.ts +11 -0
- package/src/utils/FileUtils.ts +60 -0
- package/src/utils/SarifUtils.ts +19 -71
- package/test-data/sarif/codeql-python.sarif +1448 -1
- package/test-data/sarif/codeql-typescript.sarif +3474 -1
- package/test-data/sarif/grype-github-actions.sarif +65 -0
- package/test-data/sarif/osv-scanner-composer.sarif +972 -0
- package/test-data/sarif/osv-scanner-container.sarif +2278 -0
- package/test-data/sarif/osv-scanner-gomodules.sarif +813 -0
- package/test-data/sarif/osv-scanner-hex.sarif +147 -0
- package/test-data/sarif/osv-scanner-maven.sarif +171 -0
- package/test-data/sarif/osv-scanner-npm.sarif +627 -0
- package/test-data/sarif/osv-scanner-pip.sarif +206 -0
- package/test-data/sarif/osv-scanner-pipenv.sarif +243 -0
- package/test-data/sarif/osv-scanner-pnpm.sarif +174 -0
- package/test-data/sarif/osv-scanner-poetry.sarif +1893 -0
- package/test-data/sarif/osv-scanner-rubygems.sarif +402 -0
- package/test-data/sarif/osv-scanner-uv.sarif +206 -0
- package/test-data/sarif/osv-scanner-yarn.sarif +5207 -0
- package/test-data/sarif/runs-0.sarif +5 -0
- package/test-data/sarif/runs-2-tools-2-results-0.sarif +1 -1
- package/test-data/sarif/runs-2-tools-2.sarif +1 -1
- package/test-data/sarif/runs-3-tools-2-results-0.sarif +1 -1
- package/test-data/sarif/runs-3-tools-2.sarif +1 -1
- package/test-data/sarif/tmp/codeql-csharp.sarif +1 -0
- package/test-data/sarif/tmp/grype-container.sarif +1774 -0
- package/test-data/sarif/tmp/runs-1-tools-1-results-0.sarif +18 -0
- package/test-data/sarif/tmp/runs-2-tools-2.sarif +686 -0
- package/test-data/sarif/trivy-iac.sarif +1 -1
- package/tests/integration/SendSarifToSlack.spec.ts +95 -27
- package/tsconfig.json +2 -0
- package/dist/Processors.d.ts +0 -2
- package/dist/Processors.d.ts.map +0 -1
- package/dist/Processors.js +0 -61
- package/dist/SarifToSlackService.d.ts +0 -39
- package/dist/SarifToSlackService.d.ts.map +0 -1
- package/dist/SarifToSlackService.js +0 -102
- package/dist/model/SarifModelPerRun.d.ts +0 -2
- package/dist/model/SarifModelPerRun.d.ts.map +0 -1
- package/dist/model/SarifModelPerRun.js +0 -90
- package/dist/model/SarifModelPerSarif.d.ts +0 -2
- package/dist/model/SarifModelPerSarif.d.ts.map +0 -1
- package/dist/model/SarifModelPerSarif.js +0 -102
- package/dist/model/types.d.ts +0 -2
- package/dist/model/types.d.ts.map +0 -1
- package/dist/model/types.js +0 -49
- package/dist/utils/SortUtils.d.ts +0 -2
- package/dist/utils/SortUtils.d.ts.map +0 -1
- package/dist/utils/SortUtils.js +0 -20
- package/dist/version.d.ts +0 -2
- package/dist/version.d.ts.map +0 -1
- package/dist/version.js +0 -11
- package/scripts/save-version.sh +0 -13
- package/src/Processors.ts +0 -68
- package/src/SarifToSlackService.ts +0 -115
- package/src/model/SarifModelPerRun.ts +0 -123
- package/src/model/SarifModelPerSarif.ts +0 -126
- package/src/model/types.ts +0 -50
- package/src/utils/SortUtils.ts +0 -33
- package/src/version.ts +0 -10
- package/tests/Processors.spec.ts +0 -76
|
@@ -0,0 +1,813 @@
|
|
|
1
|
+
{
|
|
2
|
+
"$schema": "https://raw.githubusercontent.com/oasis-tcs/sarif-spec/main/sarif-2.1/schema/sarif-schema-2.1.0.json",
|
|
3
|
+
"version": "2.1.0",
|
|
4
|
+
"runs": [
|
|
5
|
+
{
|
|
6
|
+
"addresses": [],
|
|
7
|
+
"artifacts": [
|
|
8
|
+
{
|
|
9
|
+
"length": -1,
|
|
10
|
+
"location": {
|
|
11
|
+
"index": -1,
|
|
12
|
+
"uri": "file:///Users/john.doe/projects/go/gomodules/go.mod"
|
|
13
|
+
},
|
|
14
|
+
"parentIndex": -1,
|
|
15
|
+
"roles": []
|
|
16
|
+
}
|
|
17
|
+
],
|
|
18
|
+
"graphs": [],
|
|
19
|
+
"invocations": [],
|
|
20
|
+
"language": "en-US",
|
|
21
|
+
"logicalLocations": [],
|
|
22
|
+
"newlineSequences": [
|
|
23
|
+
"\r\n",
|
|
24
|
+
"\n"
|
|
25
|
+
],
|
|
26
|
+
"policies": [],
|
|
27
|
+
"redactionTokens": [],
|
|
28
|
+
"results": [
|
|
29
|
+
{
|
|
30
|
+
"attachments": [],
|
|
31
|
+
"codeFlows": [],
|
|
32
|
+
"fixes": [],
|
|
33
|
+
"graphTraversals": [],
|
|
34
|
+
"graphs": [],
|
|
35
|
+
"kind": "fail",
|
|
36
|
+
"level": "warning",
|
|
37
|
+
"locations": [
|
|
38
|
+
{
|
|
39
|
+
"annotations": [],
|
|
40
|
+
"id": -1,
|
|
41
|
+
"logicalLocations": [],
|
|
42
|
+
"physicalLocation": {
|
|
43
|
+
"artifactLocation": {
|
|
44
|
+
"index": -1,
|
|
45
|
+
"uri": "file:///Users/john.doe/projects/go/gomodules/go.mod"
|
|
46
|
+
}
|
|
47
|
+
},
|
|
48
|
+
"relationships": []
|
|
49
|
+
}
|
|
50
|
+
],
|
|
51
|
+
"message": {
|
|
52
|
+
"arguments": [],
|
|
53
|
+
"text": "Package 'github.com/gin-gonic/gin@1.4.0' is vulnerable to 'CVE-2023-29401' (also known as 'GO-2023-1737', 'GHSA-2c4m-59x9-fr2g')."
|
|
54
|
+
},
|
|
55
|
+
"rank": -1,
|
|
56
|
+
"relatedLocations": [],
|
|
57
|
+
"ruleId": "CVE-2023-29401",
|
|
58
|
+
"ruleIndex": 0,
|
|
59
|
+
"stacks": [],
|
|
60
|
+
"taxa": []
|
|
61
|
+
},
|
|
62
|
+
{
|
|
63
|
+
"attachments": [],
|
|
64
|
+
"codeFlows": [],
|
|
65
|
+
"fixes": [],
|
|
66
|
+
"graphTraversals": [],
|
|
67
|
+
"graphs": [],
|
|
68
|
+
"kind": "fail",
|
|
69
|
+
"level": "warning",
|
|
70
|
+
"locations": [
|
|
71
|
+
{
|
|
72
|
+
"annotations": [],
|
|
73
|
+
"id": -1,
|
|
74
|
+
"logicalLocations": [],
|
|
75
|
+
"physicalLocation": {
|
|
76
|
+
"artifactLocation": {
|
|
77
|
+
"index": -1,
|
|
78
|
+
"uri": "file:///Users/john.doe/projects/go/gomodules/go.mod"
|
|
79
|
+
}
|
|
80
|
+
},
|
|
81
|
+
"relationships": []
|
|
82
|
+
}
|
|
83
|
+
],
|
|
84
|
+
"message": {
|
|
85
|
+
"arguments": [],
|
|
86
|
+
"text": "Package 'github.com/gin-gonic/gin@1.4.0' is vulnerable to 'CVE-2023-26125' (also known as 'GHSA-3vp4-m3rf-835h')."
|
|
87
|
+
},
|
|
88
|
+
"rank": -1,
|
|
89
|
+
"relatedLocations": [],
|
|
90
|
+
"ruleId": "CVE-2023-26125",
|
|
91
|
+
"ruleIndex": 1,
|
|
92
|
+
"stacks": [],
|
|
93
|
+
"taxa": []
|
|
94
|
+
},
|
|
95
|
+
{
|
|
96
|
+
"attachments": [],
|
|
97
|
+
"codeFlows": [],
|
|
98
|
+
"fixes": [],
|
|
99
|
+
"graphTraversals": [],
|
|
100
|
+
"graphs": [],
|
|
101
|
+
"kind": "fail",
|
|
102
|
+
"level": "warning",
|
|
103
|
+
"locations": [
|
|
104
|
+
{
|
|
105
|
+
"annotations": [],
|
|
106
|
+
"id": -1,
|
|
107
|
+
"logicalLocations": [],
|
|
108
|
+
"physicalLocation": {
|
|
109
|
+
"artifactLocation": {
|
|
110
|
+
"index": -1,
|
|
111
|
+
"uri": "file:///Users/john.doe/projects/go/gomodules/go.mod"
|
|
112
|
+
}
|
|
113
|
+
},
|
|
114
|
+
"relationships": []
|
|
115
|
+
}
|
|
116
|
+
],
|
|
117
|
+
"message": {
|
|
118
|
+
"arguments": [],
|
|
119
|
+
"text": "Package 'gopkg.in/yaml.v2@2.2.2' is vulnerable to 'CVE-2022-3064' (also known as 'GO-2022-0956', 'GHSA-6q6q-88xp-6f2r')."
|
|
120
|
+
},
|
|
121
|
+
"rank": -1,
|
|
122
|
+
"relatedLocations": [],
|
|
123
|
+
"ruleId": "CVE-2022-3064",
|
|
124
|
+
"ruleIndex": 2,
|
|
125
|
+
"stacks": [],
|
|
126
|
+
"taxa": []
|
|
127
|
+
},
|
|
128
|
+
{
|
|
129
|
+
"attachments": [],
|
|
130
|
+
"codeFlows": [],
|
|
131
|
+
"fixes": [],
|
|
132
|
+
"graphTraversals": [],
|
|
133
|
+
"graphs": [],
|
|
134
|
+
"kind": "fail",
|
|
135
|
+
"level": "warning",
|
|
136
|
+
"locations": [
|
|
137
|
+
{
|
|
138
|
+
"annotations": [],
|
|
139
|
+
"id": -1,
|
|
140
|
+
"logicalLocations": [],
|
|
141
|
+
"physicalLocation": {
|
|
142
|
+
"artifactLocation": {
|
|
143
|
+
"index": -1,
|
|
144
|
+
"uri": "file:///Users/john.doe/projects/go/gomodules/go.mod"
|
|
145
|
+
}
|
|
146
|
+
},
|
|
147
|
+
"relationships": []
|
|
148
|
+
}
|
|
149
|
+
],
|
|
150
|
+
"message": {
|
|
151
|
+
"arguments": [],
|
|
152
|
+
"text": "Package 'github.com/gin-gonic/gin@1.4.0' is vulnerable to 'CVE-2020-36567' (also known as 'GO-2020-0001', 'GHSA-6vm3-jj99-7229')."
|
|
153
|
+
},
|
|
154
|
+
"rank": -1,
|
|
155
|
+
"relatedLocations": [],
|
|
156
|
+
"ruleId": "CVE-2020-36567",
|
|
157
|
+
"ruleIndex": 3,
|
|
158
|
+
"stacks": [],
|
|
159
|
+
"taxa": []
|
|
160
|
+
},
|
|
161
|
+
{
|
|
162
|
+
"attachments": [],
|
|
163
|
+
"codeFlows": [],
|
|
164
|
+
"fixes": [],
|
|
165
|
+
"graphTraversals": [],
|
|
166
|
+
"graphs": [],
|
|
167
|
+
"kind": "fail",
|
|
168
|
+
"level": "warning",
|
|
169
|
+
"locations": [
|
|
170
|
+
{
|
|
171
|
+
"annotations": [],
|
|
172
|
+
"id": -1,
|
|
173
|
+
"logicalLocations": [],
|
|
174
|
+
"physicalLocation": {
|
|
175
|
+
"artifactLocation": {
|
|
176
|
+
"index": -1,
|
|
177
|
+
"uri": "file:///Users/john.doe/projects/go/gomodules/go.mod"
|
|
178
|
+
}
|
|
179
|
+
},
|
|
180
|
+
"relationships": []
|
|
181
|
+
}
|
|
182
|
+
],
|
|
183
|
+
"message": {
|
|
184
|
+
"arguments": [],
|
|
185
|
+
"text": "Package 'github.com/gin-gonic/gin@1.4.0' is vulnerable to 'CVE-2019-25211' (also known as 'GO-2024-2955', 'GHSA-869c-j7wc-8jqv')."
|
|
186
|
+
},
|
|
187
|
+
"rank": -1,
|
|
188
|
+
"relatedLocations": [],
|
|
189
|
+
"ruleId": "CVE-2019-25211",
|
|
190
|
+
"ruleIndex": 4,
|
|
191
|
+
"stacks": [],
|
|
192
|
+
"taxa": []
|
|
193
|
+
},
|
|
194
|
+
{
|
|
195
|
+
"attachments": [],
|
|
196
|
+
"codeFlows": [],
|
|
197
|
+
"fixes": [],
|
|
198
|
+
"graphTraversals": [],
|
|
199
|
+
"graphs": [],
|
|
200
|
+
"kind": "fail",
|
|
201
|
+
"level": "warning",
|
|
202
|
+
"locations": [
|
|
203
|
+
{
|
|
204
|
+
"annotations": [],
|
|
205
|
+
"id": -1,
|
|
206
|
+
"logicalLocations": [],
|
|
207
|
+
"physicalLocation": {
|
|
208
|
+
"artifactLocation": {
|
|
209
|
+
"index": -1,
|
|
210
|
+
"uri": "file:///Users/john.doe/projects/go/gomodules/go.mod"
|
|
211
|
+
}
|
|
212
|
+
},
|
|
213
|
+
"relationships": []
|
|
214
|
+
}
|
|
215
|
+
],
|
|
216
|
+
"message": {
|
|
217
|
+
"arguments": [],
|
|
218
|
+
"text": "Package 'github.com/gin-gonic/gin@1.4.0' is vulnerable to 'CVE-2020-28483' (also known as 'GO-2021-0052', 'GHSA-h395-qcrw-5vmq')."
|
|
219
|
+
},
|
|
220
|
+
"rank": -1,
|
|
221
|
+
"relatedLocations": [],
|
|
222
|
+
"ruleId": "CVE-2020-28483",
|
|
223
|
+
"ruleIndex": 5,
|
|
224
|
+
"stacks": [],
|
|
225
|
+
"taxa": []
|
|
226
|
+
},
|
|
227
|
+
{
|
|
228
|
+
"attachments": [],
|
|
229
|
+
"codeFlows": [],
|
|
230
|
+
"fixes": [],
|
|
231
|
+
"graphTraversals": [],
|
|
232
|
+
"graphs": [],
|
|
233
|
+
"kind": "fail",
|
|
234
|
+
"level": "warning",
|
|
235
|
+
"locations": [
|
|
236
|
+
{
|
|
237
|
+
"annotations": [],
|
|
238
|
+
"id": -1,
|
|
239
|
+
"logicalLocations": [],
|
|
240
|
+
"physicalLocation": {
|
|
241
|
+
"artifactLocation": {
|
|
242
|
+
"index": -1,
|
|
243
|
+
"uri": "file:///Users/john.doe/projects/go/gomodules/go.mod"
|
|
244
|
+
}
|
|
245
|
+
},
|
|
246
|
+
"relationships": []
|
|
247
|
+
}
|
|
248
|
+
],
|
|
249
|
+
"message": {
|
|
250
|
+
"arguments": [],
|
|
251
|
+
"text": "Package 'golang.org/x/sys@0.0.0-20190222072716-a9d3bda3a223' is vulnerable to 'CVE-2022-29526' (also known as 'BIT-golang-2022-29526', 'GO-2022-0493', 'GHSA-p782-xgp4-8hr8')."
|
|
252
|
+
},
|
|
253
|
+
"rank": -1,
|
|
254
|
+
"relatedLocations": [],
|
|
255
|
+
"ruleId": "CVE-2022-29526",
|
|
256
|
+
"ruleIndex": 6,
|
|
257
|
+
"stacks": [],
|
|
258
|
+
"taxa": []
|
|
259
|
+
},
|
|
260
|
+
{
|
|
261
|
+
"attachments": [],
|
|
262
|
+
"codeFlows": [],
|
|
263
|
+
"fixes": [],
|
|
264
|
+
"graphTraversals": [],
|
|
265
|
+
"graphs": [],
|
|
266
|
+
"kind": "fail",
|
|
267
|
+
"level": "warning",
|
|
268
|
+
"locations": [
|
|
269
|
+
{
|
|
270
|
+
"annotations": [],
|
|
271
|
+
"id": -1,
|
|
272
|
+
"logicalLocations": [],
|
|
273
|
+
"physicalLocation": {
|
|
274
|
+
"artifactLocation": {
|
|
275
|
+
"index": -1,
|
|
276
|
+
"uri": "file:///Users/john.doe/projects/go/gomodules/go.mod"
|
|
277
|
+
}
|
|
278
|
+
},
|
|
279
|
+
"relationships": []
|
|
280
|
+
}
|
|
281
|
+
],
|
|
282
|
+
"message": {
|
|
283
|
+
"arguments": [],
|
|
284
|
+
"text": "Package 'gopkg.in/yaml.v2@2.2.2' is vulnerable to 'CVE-2021-4235' (also known as 'GO-2021-0061', 'GHSA-r88r-gmrh-7j83')."
|
|
285
|
+
},
|
|
286
|
+
"rank": -1,
|
|
287
|
+
"relatedLocations": [],
|
|
288
|
+
"ruleId": "CVE-2021-4235",
|
|
289
|
+
"ruleIndex": 7,
|
|
290
|
+
"stacks": [],
|
|
291
|
+
"taxa": []
|
|
292
|
+
},
|
|
293
|
+
{
|
|
294
|
+
"attachments": [],
|
|
295
|
+
"codeFlows": [],
|
|
296
|
+
"fixes": [],
|
|
297
|
+
"graphTraversals": [],
|
|
298
|
+
"graphs": [],
|
|
299
|
+
"kind": "fail",
|
|
300
|
+
"level": "warning",
|
|
301
|
+
"locations": [
|
|
302
|
+
{
|
|
303
|
+
"annotations": [],
|
|
304
|
+
"id": -1,
|
|
305
|
+
"logicalLocations": [],
|
|
306
|
+
"physicalLocation": {
|
|
307
|
+
"artifactLocation": {
|
|
308
|
+
"index": -1,
|
|
309
|
+
"uri": "file:///Users/john.doe/projects/go/gomodules/go.mod"
|
|
310
|
+
}
|
|
311
|
+
},
|
|
312
|
+
"relationships": []
|
|
313
|
+
}
|
|
314
|
+
],
|
|
315
|
+
"message": {
|
|
316
|
+
"arguments": [],
|
|
317
|
+
"text": "Package 'gopkg.in/yaml.v2@2.2.2' is vulnerable to 'CVE-2019-11254' (also known as 'GO-2020-0036', 'GHSA-wxc4-f4m6-wwqv')."
|
|
318
|
+
},
|
|
319
|
+
"rank": -1,
|
|
320
|
+
"relatedLocations": [],
|
|
321
|
+
"ruleId": "CVE-2019-11254",
|
|
322
|
+
"ruleIndex": 8,
|
|
323
|
+
"stacks": [],
|
|
324
|
+
"taxa": []
|
|
325
|
+
},
|
|
326
|
+
{
|
|
327
|
+
"attachments": [],
|
|
328
|
+
"codeFlows": [],
|
|
329
|
+
"fixes": [],
|
|
330
|
+
"graphTraversals": [],
|
|
331
|
+
"graphs": [],
|
|
332
|
+
"kind": "fail",
|
|
333
|
+
"level": "warning",
|
|
334
|
+
"locations": [
|
|
335
|
+
{
|
|
336
|
+
"annotations": [],
|
|
337
|
+
"id": -1,
|
|
338
|
+
"logicalLocations": [],
|
|
339
|
+
"physicalLocation": {
|
|
340
|
+
"artifactLocation": {
|
|
341
|
+
"index": -1,
|
|
342
|
+
"uri": "file:///Users/john.doe/projects/go/gomodules/go.mod"
|
|
343
|
+
}
|
|
344
|
+
},
|
|
345
|
+
"relationships": []
|
|
346
|
+
}
|
|
347
|
+
],
|
|
348
|
+
"message": {
|
|
349
|
+
"arguments": [],
|
|
350
|
+
"text": "Package 'github.com/gin-gonic/gin@1.4.0' is vulnerable to 'CVE-2020-36567' (also known as 'GO-2020-0001', 'GHSA-6vm3-jj99-7229')."
|
|
351
|
+
},
|
|
352
|
+
"rank": -1,
|
|
353
|
+
"relatedLocations": [],
|
|
354
|
+
"ruleId": "CVE-2020-36567",
|
|
355
|
+
"ruleIndex": 3,
|
|
356
|
+
"stacks": [],
|
|
357
|
+
"taxa": []
|
|
358
|
+
},
|
|
359
|
+
{
|
|
360
|
+
"attachments": [],
|
|
361
|
+
"codeFlows": [],
|
|
362
|
+
"fixes": [],
|
|
363
|
+
"graphTraversals": [],
|
|
364
|
+
"graphs": [],
|
|
365
|
+
"kind": "fail",
|
|
366
|
+
"level": "warning",
|
|
367
|
+
"locations": [
|
|
368
|
+
{
|
|
369
|
+
"annotations": [],
|
|
370
|
+
"id": -1,
|
|
371
|
+
"logicalLocations": [],
|
|
372
|
+
"physicalLocation": {
|
|
373
|
+
"artifactLocation": {
|
|
374
|
+
"index": -1,
|
|
375
|
+
"uri": "file:///Users/john.doe/projects/go/gomodules/go.mod"
|
|
376
|
+
}
|
|
377
|
+
},
|
|
378
|
+
"relationships": []
|
|
379
|
+
}
|
|
380
|
+
],
|
|
381
|
+
"message": {
|
|
382
|
+
"arguments": [],
|
|
383
|
+
"text": "Package 'gopkg.in/yaml.v2@2.2.2' is vulnerable to 'CVE-2019-11254' (also known as 'GO-2020-0036', 'GHSA-wxc4-f4m6-wwqv')."
|
|
384
|
+
},
|
|
385
|
+
"rank": -1,
|
|
386
|
+
"relatedLocations": [],
|
|
387
|
+
"ruleId": "CVE-2019-11254",
|
|
388
|
+
"ruleIndex": 8,
|
|
389
|
+
"stacks": [],
|
|
390
|
+
"taxa": []
|
|
391
|
+
},
|
|
392
|
+
{
|
|
393
|
+
"attachments": [],
|
|
394
|
+
"codeFlows": [],
|
|
395
|
+
"fixes": [],
|
|
396
|
+
"graphTraversals": [],
|
|
397
|
+
"graphs": [],
|
|
398
|
+
"kind": "fail",
|
|
399
|
+
"level": "warning",
|
|
400
|
+
"locations": [
|
|
401
|
+
{
|
|
402
|
+
"annotations": [],
|
|
403
|
+
"id": -1,
|
|
404
|
+
"logicalLocations": [],
|
|
405
|
+
"physicalLocation": {
|
|
406
|
+
"artifactLocation": {
|
|
407
|
+
"index": -1,
|
|
408
|
+
"uri": "file:///Users/john.doe/projects/go/gomodules/go.mod"
|
|
409
|
+
}
|
|
410
|
+
},
|
|
411
|
+
"relationships": []
|
|
412
|
+
}
|
|
413
|
+
],
|
|
414
|
+
"message": {
|
|
415
|
+
"arguments": [],
|
|
416
|
+
"text": "Package 'github.com/gin-gonic/gin@1.4.0' is vulnerable to 'CVE-2020-28483' (also known as 'GO-2021-0052', 'GHSA-h395-qcrw-5vmq')."
|
|
417
|
+
},
|
|
418
|
+
"rank": -1,
|
|
419
|
+
"relatedLocations": [],
|
|
420
|
+
"ruleId": "CVE-2020-28483",
|
|
421
|
+
"ruleIndex": 5,
|
|
422
|
+
"stacks": [],
|
|
423
|
+
"taxa": []
|
|
424
|
+
},
|
|
425
|
+
{
|
|
426
|
+
"attachments": [],
|
|
427
|
+
"codeFlows": [],
|
|
428
|
+
"fixes": [],
|
|
429
|
+
"graphTraversals": [],
|
|
430
|
+
"graphs": [],
|
|
431
|
+
"kind": "fail",
|
|
432
|
+
"level": "warning",
|
|
433
|
+
"locations": [
|
|
434
|
+
{
|
|
435
|
+
"annotations": [],
|
|
436
|
+
"id": -1,
|
|
437
|
+
"logicalLocations": [],
|
|
438
|
+
"physicalLocation": {
|
|
439
|
+
"artifactLocation": {
|
|
440
|
+
"index": -1,
|
|
441
|
+
"uri": "file:///Users/john.doe/projects/go/gomodules/go.mod"
|
|
442
|
+
}
|
|
443
|
+
},
|
|
444
|
+
"relationships": []
|
|
445
|
+
}
|
|
446
|
+
],
|
|
447
|
+
"message": {
|
|
448
|
+
"arguments": [],
|
|
449
|
+
"text": "Package 'gopkg.in/yaml.v2@2.2.2' is vulnerable to 'CVE-2021-4235' (also known as 'GO-2021-0061', 'GHSA-r88r-gmrh-7j83')."
|
|
450
|
+
},
|
|
451
|
+
"rank": -1,
|
|
452
|
+
"relatedLocations": [],
|
|
453
|
+
"ruleId": "CVE-2021-4235",
|
|
454
|
+
"ruleIndex": 7,
|
|
455
|
+
"stacks": [],
|
|
456
|
+
"taxa": []
|
|
457
|
+
},
|
|
458
|
+
{
|
|
459
|
+
"attachments": [],
|
|
460
|
+
"codeFlows": [],
|
|
461
|
+
"fixes": [],
|
|
462
|
+
"graphTraversals": [],
|
|
463
|
+
"graphs": [],
|
|
464
|
+
"kind": "fail",
|
|
465
|
+
"level": "warning",
|
|
466
|
+
"locations": [
|
|
467
|
+
{
|
|
468
|
+
"annotations": [],
|
|
469
|
+
"id": -1,
|
|
470
|
+
"logicalLocations": [],
|
|
471
|
+
"physicalLocation": {
|
|
472
|
+
"artifactLocation": {
|
|
473
|
+
"index": -1,
|
|
474
|
+
"uri": "file:///Users/john.doe/projects/go/gomodules/go.mod"
|
|
475
|
+
}
|
|
476
|
+
},
|
|
477
|
+
"relationships": []
|
|
478
|
+
}
|
|
479
|
+
],
|
|
480
|
+
"message": {
|
|
481
|
+
"arguments": [],
|
|
482
|
+
"text": "Package 'golang.org/x/sys@0.0.0-20190222072716-a9d3bda3a223' is vulnerable to 'CVE-2022-29526' (also known as 'BIT-golang-2022-29526', 'GO-2022-0493', 'GHSA-p782-xgp4-8hr8')."
|
|
483
|
+
},
|
|
484
|
+
"rank": -1,
|
|
485
|
+
"relatedLocations": [],
|
|
486
|
+
"ruleId": "CVE-2022-29526",
|
|
487
|
+
"ruleIndex": 6,
|
|
488
|
+
"stacks": [],
|
|
489
|
+
"taxa": []
|
|
490
|
+
},
|
|
491
|
+
{
|
|
492
|
+
"attachments": [],
|
|
493
|
+
"codeFlows": [],
|
|
494
|
+
"fixes": [],
|
|
495
|
+
"graphTraversals": [],
|
|
496
|
+
"graphs": [],
|
|
497
|
+
"kind": "fail",
|
|
498
|
+
"level": "warning",
|
|
499
|
+
"locations": [
|
|
500
|
+
{
|
|
501
|
+
"annotations": [],
|
|
502
|
+
"id": -1,
|
|
503
|
+
"logicalLocations": [],
|
|
504
|
+
"physicalLocation": {
|
|
505
|
+
"artifactLocation": {
|
|
506
|
+
"index": -1,
|
|
507
|
+
"uri": "file:///Users/john.doe/projects/go/gomodules/go.mod"
|
|
508
|
+
}
|
|
509
|
+
},
|
|
510
|
+
"relationships": []
|
|
511
|
+
}
|
|
512
|
+
],
|
|
513
|
+
"message": {
|
|
514
|
+
"arguments": [],
|
|
515
|
+
"text": "Package 'gopkg.in/yaml.v2@2.2.2' is vulnerable to 'CVE-2022-3064' (also known as 'GO-2022-0956', 'GHSA-6q6q-88xp-6f2r')."
|
|
516
|
+
},
|
|
517
|
+
"rank": -1,
|
|
518
|
+
"relatedLocations": [],
|
|
519
|
+
"ruleId": "CVE-2022-3064",
|
|
520
|
+
"ruleIndex": 2,
|
|
521
|
+
"stacks": [],
|
|
522
|
+
"taxa": []
|
|
523
|
+
},
|
|
524
|
+
{
|
|
525
|
+
"attachments": [],
|
|
526
|
+
"codeFlows": [],
|
|
527
|
+
"fixes": [],
|
|
528
|
+
"graphTraversals": [],
|
|
529
|
+
"graphs": [],
|
|
530
|
+
"kind": "fail",
|
|
531
|
+
"level": "warning",
|
|
532
|
+
"locations": [
|
|
533
|
+
{
|
|
534
|
+
"annotations": [],
|
|
535
|
+
"id": -1,
|
|
536
|
+
"logicalLocations": [],
|
|
537
|
+
"physicalLocation": {
|
|
538
|
+
"artifactLocation": {
|
|
539
|
+
"index": -1,
|
|
540
|
+
"uri": "file:///Users/john.doe/projects/go/gomodules/go.mod"
|
|
541
|
+
}
|
|
542
|
+
},
|
|
543
|
+
"relationships": []
|
|
544
|
+
}
|
|
545
|
+
],
|
|
546
|
+
"message": {
|
|
547
|
+
"arguments": [],
|
|
548
|
+
"text": "Package 'github.com/gin-gonic/gin@1.4.0' is vulnerable to 'CVE-2023-29401' (also known as 'GO-2023-1737', 'GHSA-2c4m-59x9-fr2g')."
|
|
549
|
+
},
|
|
550
|
+
"rank": -1,
|
|
551
|
+
"relatedLocations": [],
|
|
552
|
+
"ruleId": "CVE-2023-29401",
|
|
553
|
+
"ruleIndex": 0,
|
|
554
|
+
"stacks": [],
|
|
555
|
+
"taxa": []
|
|
556
|
+
}
|
|
557
|
+
],
|
|
558
|
+
"runAggregates": [],
|
|
559
|
+
"taxonomies": [],
|
|
560
|
+
"threadFlowLocations": [],
|
|
561
|
+
"tool": {
|
|
562
|
+
"driver": {
|
|
563
|
+
"contents": [
|
|
564
|
+
"localizedData",
|
|
565
|
+
"nonLocalizedData"
|
|
566
|
+
],
|
|
567
|
+
"informationUri": "https://github.com/google/osv-scanner",
|
|
568
|
+
"isComprehensive": false,
|
|
569
|
+
"language": "en-US",
|
|
570
|
+
"locations": [],
|
|
571
|
+
"name": "osv-scanner",
|
|
572
|
+
"notifications": [],
|
|
573
|
+
"rules": [
|
|
574
|
+
{
|
|
575
|
+
"deprecatedIds": [
|
|
576
|
+
"CVE-2023-29401",
|
|
577
|
+
"GO-2023-1737",
|
|
578
|
+
"GHSA-2c4m-59x9-fr2g"
|
|
579
|
+
],
|
|
580
|
+
"fullDescription": {
|
|
581
|
+
"markdown": "The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of \"setup.bat\u0026quot;;x=.txt\" will be sent as a file named \"setup.bat\".\n\nIf the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.",
|
|
582
|
+
"text": "The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of \"setup.bat\u0026quot;;x=.txt\" will be sent as a file named \"setup.bat\".\n\nIf the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header."
|
|
583
|
+
},
|
|
584
|
+
"help": {
|
|
585
|
+
"markdown": "**Your dependency is vulnerable to [CVE-2023-29401](https://osv.dev/CVE-2023-29401)**\n(Also published as: [GO-2023-1737](https://osv.dev/GO-2023-1737), [GHSA-2c4m-59x9-fr2g](https://osv.dev/GHSA-2c4m-59x9-fr2g), ).\n\n## [GO-2023-1737](https://osv.dev/GO-2023-1737)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of \"setup.bat\u0026quot;;x=.txt\" will be sent as a file named \"setup.bat\".\n\u003e \n\u003e If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.\n\n\u003c/details\u003e\n\n## [GHSA-2c4m-59x9-fr2g](https://osv.dev/GHSA-2c4m-59x9-fr2g)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of \"setup.bat\u0026quot;;x=.txt\" will be sent as a file named \"setup.bat\".\n\u003e \n\u003e If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/go/gomodules/go.mod | github.com/gin-gonic/gin | 1.4.0 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-2c4m-59x9-fr2g | github.com/gin-gonic/gin | 1.9.1 |\n| GO-2023-1737 | github.com/gin-gonic/gin | 1.9.1 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/go/gomodules/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2023-29401\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
|
|
586
|
+
"text": "**Your dependency is vulnerable to [CVE-2023-29401](https://osv.dev/CVE-2023-29401)**\n(Also published as: [GO-2023-1737](https://osv.dev/GO-2023-1737), [GHSA-2c4m-59x9-fr2g](https://osv.dev/GHSA-2c4m-59x9-fr2g), ).\n\n## [GO-2023-1737](https://osv.dev/GO-2023-1737)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of \"setup.bat\u0026quot;;x=.txt\" will be sent as a file named \"setup.bat\".\n\u003e \n\u003e If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.\n\n\u003c/details\u003e\n\n## [GHSA-2c4m-59x9-fr2g](https://osv.dev/GHSA-2c4m-59x9-fr2g)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of \"setup.bat\u0026quot;;x=.txt\" will be sent as a file named \"setup.bat\".\n\u003e \n\u003e If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/go/gomodules/go.mod | github.com/gin-gonic/gin | 1.4.0 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-2c4m-59x9-fr2g | github.com/gin-gonic/gin | 1.9.1 |\n| GO-2023-1737 | github.com/gin-gonic/gin | 1.9.1 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/go/gomodules/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2023-29401\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
|
|
587
|
+
},
|
|
588
|
+
"id": "CVE-2023-29401",
|
|
589
|
+
"name": "CVE-2023-29401",
|
|
590
|
+
"properties": {
|
|
591
|
+
"security-severity": "4.3"
|
|
592
|
+
},
|
|
593
|
+
"relationships": [],
|
|
594
|
+
"shortDescription": {
|
|
595
|
+
"markdown": "CVE-2023-29401: Improper handling of filenames in Content-Disposition HTTP header in github.com/gin-gonic/gin",
|
|
596
|
+
"text": "CVE-2023-29401: Improper handling of filenames in Content-Disposition HTTP header in github.com/gin-gonic/gin"
|
|
597
|
+
}
|
|
598
|
+
},
|
|
599
|
+
{
|
|
600
|
+
"deprecatedIds": [
|
|
601
|
+
"CVE-2023-26125",
|
|
602
|
+
"GHSA-3vp4-m3rf-835h"
|
|
603
|
+
],
|
|
604
|
+
"fullDescription": {
|
|
605
|
+
"markdown": "Versions of the package github.com/gin-gonic/gin before version 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.\n\n**Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.",
|
|
606
|
+
"text": "Versions of the package github.com/gin-gonic/gin before version 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.\n\n**Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic."
|
|
607
|
+
},
|
|
608
|
+
"help": {
|
|
609
|
+
"markdown": "**Your dependency is vulnerable to [CVE-2023-26125](https://osv.dev/CVE-2023-26125)**.\n\n## [GHSA-3vp4-m3rf-835h](https://osv.dev/GHSA-3vp4-m3rf-835h)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Versions of the package github.com/gin-gonic/gin before version 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.\n\u003e \n\u003e **Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/go/gomodules/go.mod | github.com/gin-gonic/gin | 1.4.0 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-3vp4-m3rf-835h | github.com/gin-gonic/gin | 1.9.0 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/go/gomodules/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2023-26125\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
|
|
610
|
+
"text": "**Your dependency is vulnerable to [CVE-2023-26125](https://osv.dev/CVE-2023-26125)**.\n\n## [GHSA-3vp4-m3rf-835h](https://osv.dev/GHSA-3vp4-m3rf-835h)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Versions of the package github.com/gin-gonic/gin before version 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.\n\u003e \n\u003e **Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/go/gomodules/go.mod | github.com/gin-gonic/gin | 1.4.0 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-3vp4-m3rf-835h | github.com/gin-gonic/gin | 1.9.0 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/go/gomodules/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2023-26125\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
|
|
611
|
+
},
|
|
612
|
+
"id": "CVE-2023-26125",
|
|
613
|
+
"name": "CVE-2023-26125",
|
|
614
|
+
"properties": {
|
|
615
|
+
"security-severity": "5.6"
|
|
616
|
+
},
|
|
617
|
+
"relationships": [],
|
|
618
|
+
"shortDescription": {
|
|
619
|
+
"markdown": "CVE-2023-26125: Improper input validation in github.com/gin-gonic/gin",
|
|
620
|
+
"text": "CVE-2023-26125: Improper input validation in github.com/gin-gonic/gin"
|
|
621
|
+
}
|
|
622
|
+
},
|
|
623
|
+
{
|
|
624
|
+
"deprecatedIds": [
|
|
625
|
+
"CVE-2022-3064",
|
|
626
|
+
"GO-2022-0956",
|
|
627
|
+
"GHSA-6q6q-88xp-6f2r"
|
|
628
|
+
],
|
|
629
|
+
"fullDescription": {
|
|
630
|
+
"markdown": "Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.",
|
|
631
|
+
"text": "Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory."
|
|
632
|
+
},
|
|
633
|
+
"help": {
|
|
634
|
+
"markdown": "**Your dependency is vulnerable to [CVE-2022-3064](https://osv.dev/CVE-2022-3064)**\n(Also published as: [GO-2022-0956](https://osv.dev/GO-2022-0956), [GHSA-6q6q-88xp-6f2r](https://osv.dev/GHSA-6q6q-88xp-6f2r), ).\n\n## [GO-2022-0956](https://osv.dev/GO-2022-0956)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.\n\n\u003c/details\u003e\n\n## [GHSA-6q6q-88xp-6f2r](https://osv.dev/GHSA-6q6q-88xp-6f2r)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/go/gomodules/go.mod | gopkg.in/yaml.v2 | 2.2.2 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-6q6q-88xp-6f2r | gopkg.in/yaml.v2 | 2.2.4 |\n| GO-2022-0956 | gopkg.in/yaml.v2 | 2.2.4 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/go/gomodules/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2022-3064\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
|
|
635
|
+
"text": "**Your dependency is vulnerable to [CVE-2022-3064](https://osv.dev/CVE-2022-3064)**\n(Also published as: [GO-2022-0956](https://osv.dev/GO-2022-0956), [GHSA-6q6q-88xp-6f2r](https://osv.dev/GHSA-6q6q-88xp-6f2r), ).\n\n## [GO-2022-0956](https://osv.dev/GO-2022-0956)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory.\n\n\u003c/details\u003e\n\n## [GHSA-6q6q-88xp-6f2r](https://osv.dev/GHSA-6q6q-88xp-6f2r)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Parsing malicious or large YAML documents can consume excessive amounts of CPU or memory\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/go/gomodules/go.mod | gopkg.in/yaml.v2 | 2.2.2 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-6q6q-88xp-6f2r | gopkg.in/yaml.v2 | 2.2.4 |\n| GO-2022-0956 | gopkg.in/yaml.v2 | 2.2.4 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/go/gomodules/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2022-3064\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
|
|
636
|
+
},
|
|
637
|
+
"id": "CVE-2022-3064",
|
|
638
|
+
"name": "CVE-2022-3064",
|
|
639
|
+
"properties": {
|
|
640
|
+
"security-severity": "7.5"
|
|
641
|
+
},
|
|
642
|
+
"relationships": [],
|
|
643
|
+
"shortDescription": {
|
|
644
|
+
"markdown": "CVE-2022-3064: Excessive resource consumption in gopkg.in/yaml.v2",
|
|
645
|
+
"text": "CVE-2022-3064: Excessive resource consumption in gopkg.in/yaml.v2"
|
|
646
|
+
}
|
|
647
|
+
},
|
|
648
|
+
{
|
|
649
|
+
"deprecatedIds": [
|
|
650
|
+
"CVE-2020-36567",
|
|
651
|
+
"GO-2020-0001",
|
|
652
|
+
"GHSA-6vm3-jj99-7229"
|
|
653
|
+
],
|
|
654
|
+
"fullDescription": {
|
|
655
|
+
"markdown": "The default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path.",
|
|
656
|
+
"text": "The default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path."
|
|
657
|
+
},
|
|
658
|
+
"help": {
|
|
659
|
+
"markdown": "**Your dependency is vulnerable to [CVE-2020-36567](https://osv.dev/CVE-2020-36567)**\n(Also published as: [GO-2020-0001](https://osv.dev/GO-2020-0001), [GHSA-6vm3-jj99-7229](https://osv.dev/GHSA-6vm3-jj99-7229), ).\n\n## [GO-2020-0001](https://osv.dev/GO-2020-0001)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e The default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path.\n\n\u003c/details\u003e\n\n## [GHSA-6vm3-jj99-7229](https://osv.dev/GHSA-6vm3-jj99-7229)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Gin is a HTTP web framework written in Go (Golang). Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/go/gomodules/go.mod | github.com/gin-gonic/gin | 1.4.0 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-6vm3-jj99-7229 | github.com/gin-gonic/gin | 1.6.0 |\n| GO-2020-0001 | github.com/gin-gonic/gin | 1.6.0 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/go/gomodules/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2020-36567\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
|
|
660
|
+
"text": "**Your dependency is vulnerable to [CVE-2020-36567](https://osv.dev/CVE-2020-36567)**\n(Also published as: [GO-2020-0001](https://osv.dev/GO-2020-0001), [GHSA-6vm3-jj99-7229](https://osv.dev/GHSA-6vm3-jj99-7229), ).\n\n## [GO-2020-0001](https://osv.dev/GO-2020-0001)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e The default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path.\n\n\u003c/details\u003e\n\n## [GHSA-6vm3-jj99-7229](https://osv.dev/GHSA-6vm3-jj99-7229)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Gin is a HTTP web framework written in Go (Golang). Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/go/gomodules/go.mod | github.com/gin-gonic/gin | 1.4.0 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-6vm3-jj99-7229 | github.com/gin-gonic/gin | 1.6.0 |\n| GO-2020-0001 | github.com/gin-gonic/gin | 1.6.0 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/go/gomodules/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2020-36567\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
|
|
661
|
+
},
|
|
662
|
+
"id": "CVE-2020-36567",
|
|
663
|
+
"name": "CVE-2020-36567",
|
|
664
|
+
"properties": {
|
|
665
|
+
"security-severity": "7.5"
|
|
666
|
+
},
|
|
667
|
+
"relationships": [],
|
|
668
|
+
"shortDescription": {
|
|
669
|
+
"markdown": "CVE-2020-36567: Arbitrary log line injection in github.com/gin-gonic/gin",
|
|
670
|
+
"text": "CVE-2020-36567: Arbitrary log line injection in github.com/gin-gonic/gin"
|
|
671
|
+
}
|
|
672
|
+
},
|
|
673
|
+
{
|
|
674
|
+
"deprecatedIds": [
|
|
675
|
+
"CVE-2019-25211",
|
|
676
|
+
"GO-2024-2955",
|
|
677
|
+
"GHSA-869c-j7wc-8jqv"
|
|
678
|
+
],
|
|
679
|
+
"fullDescription": {
|
|
680
|
+
"markdown": "parseWildcardRules in Gin-Gonic CORS middleware before 1.6.0 mishandles a wildcard at the end of an origin string, e.g., https://example.community/* is allowed when the intention is that only https://example.com/* should be allowed, and http://localhost.example.com/* is allowed when the intention is that only http://localhost/* should be allowed.",
|
|
681
|
+
"text": "parseWildcardRules in Gin-Gonic CORS middleware before 1.6.0 mishandles a wildcard at the end of an origin string, e.g., https://example.community/* is allowed when the intention is that only https://example.com/* should be allowed, and http://localhost.example.com/* is allowed when the intention is that only http://localhost/* should be allowed."
|
|
682
|
+
},
|
|
683
|
+
"help": {
|
|
684
|
+
"markdown": "**Your dependency is vulnerable to [CVE-2019-25211](https://osv.dev/CVE-2019-25211)**.\n\n## [GHSA-869c-j7wc-8jqv](https://osv.dev/GHSA-869c-j7wc-8jqv)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e parseWildcardRules in Gin-Gonic CORS middleware before 1.6.0 mishandles a wildcard at the end of an origin string, e.g., https://example.community/* is allowed when the intention is that only https://example.com/* should be allowed, and http://localhost.example.com/* is allowed when the intention is that only http://localhost/* should be allowed.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/go/gomodules/go.mod | github.com/gin-gonic/gin | 1.4.0 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-869c-j7wc-8jqv | github.com/gin-gonic/gin | 1.6.0 |\n| GHSA-869c-j7wc-8jqv | github.com/gin-contrib/cors | 1.6.0 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/go/gomodules/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2019-25211\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
|
|
685
|
+
"text": "**Your dependency is vulnerable to [CVE-2019-25211](https://osv.dev/CVE-2019-25211)**.\n\n## [GHSA-869c-j7wc-8jqv](https://osv.dev/GHSA-869c-j7wc-8jqv)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e parseWildcardRules in Gin-Gonic CORS middleware before 1.6.0 mishandles a wildcard at the end of an origin string, e.g., https://example.community/* is allowed when the intention is that only https://example.com/* should be allowed, and http://localhost.example.com/* is allowed when the intention is that only http://localhost/* should be allowed.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/go/gomodules/go.mod | github.com/gin-gonic/gin | 1.4.0 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-869c-j7wc-8jqv | github.com/gin-gonic/gin | 1.6.0 |\n| GHSA-869c-j7wc-8jqv | github.com/gin-contrib/cors | 1.6.0 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/go/gomodules/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2019-25211\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
|
|
686
|
+
},
|
|
687
|
+
"id": "CVE-2019-25211",
|
|
688
|
+
"name": "CVE-2019-25211",
|
|
689
|
+
"properties": {
|
|
690
|
+
"security-severity": "9.3"
|
|
691
|
+
},
|
|
692
|
+
"relationships": [],
|
|
693
|
+
"shortDescription": {
|
|
694
|
+
"markdown": "CVE-2019-25211: Gin mishandles a wildcard at the end of an origin string",
|
|
695
|
+
"text": "CVE-2019-25211: Gin mishandles a wildcard at the end of an origin string"
|
|
696
|
+
}
|
|
697
|
+
},
|
|
698
|
+
{
|
|
699
|
+
"deprecatedIds": [
|
|
700
|
+
"CVE-2020-28483",
|
|
701
|
+
"GO-2021-0052",
|
|
702
|
+
"GHSA-h395-qcrw-5vmq"
|
|
703
|
+
],
|
|
704
|
+
"fullDescription": {
|
|
705
|
+
"markdown": "Due to improper HTTP header sanitization, a malicious user can spoof their source IP address by setting the X-Forwarded-For header. This may allow a user to bypass IP based restrictions, or obfuscate their true source.",
|
|
706
|
+
"text": "Due to improper HTTP header sanitization, a malicious user can spoof their source IP address by setting the X-Forwarded-For header. This may allow a user to bypass IP based restrictions, or obfuscate their true source."
|
|
707
|
+
},
|
|
708
|
+
"help": {
|
|
709
|
+
"markdown": "**Your dependency is vulnerable to [CVE-2020-28483](https://osv.dev/CVE-2020-28483)**\n(Also published as: [GO-2021-0052](https://osv.dev/GO-2021-0052), [GHSA-h395-qcrw-5vmq](https://osv.dev/GHSA-h395-qcrw-5vmq), ).\n\n## [GO-2021-0052](https://osv.dev/GO-2021-0052)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Due to improper HTTP header sanitization, a malicious user can spoof their source IP address by setting the X-Forwarded-For header. This may allow a user to bypass IP based restrictions, or obfuscate their true source.\n\n\u003c/details\u003e\n\n## [GHSA-h395-qcrw-5vmq](https://osv.dev/GHSA-h395-qcrw-5vmq)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header. This affects all versions of package github.com/gin-gonic/gin under 1.7.7. \n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/go/gomodules/go.mod | github.com/gin-gonic/gin | 1.4.0 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-h395-qcrw-5vmq | github.com/gin-gonic/gin | 1.7.7 |\n| GO-2021-0052 | github.com/gin-gonic/gin | 1.7.7 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/go/gomodules/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2020-28483\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
|
|
710
|
+
"text": "**Your dependency is vulnerable to [CVE-2020-28483](https://osv.dev/CVE-2020-28483)**\n(Also published as: [GO-2021-0052](https://osv.dev/GO-2021-0052), [GHSA-h395-qcrw-5vmq](https://osv.dev/GHSA-h395-qcrw-5vmq), ).\n\n## [GO-2021-0052](https://osv.dev/GO-2021-0052)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Due to improper HTTP header sanitization, a malicious user can spoof their source IP address by setting the X-Forwarded-For header. This may allow a user to bypass IP based restrictions, or obfuscate their true source.\n\n\u003c/details\u003e\n\n## [GHSA-h395-qcrw-5vmq](https://osv.dev/GHSA-h395-qcrw-5vmq)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header. This affects all versions of package github.com/gin-gonic/gin under 1.7.7. \n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/go/gomodules/go.mod | github.com/gin-gonic/gin | 1.4.0 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-h395-qcrw-5vmq | github.com/gin-gonic/gin | 1.7.7 |\n| GO-2021-0052 | github.com/gin-gonic/gin | 1.7.7 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/go/gomodules/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2020-28483\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
|
|
711
|
+
},
|
|
712
|
+
"id": "CVE-2020-28483",
|
|
713
|
+
"name": "CVE-2020-28483",
|
|
714
|
+
"properties": {
|
|
715
|
+
"security-severity": "7.1"
|
|
716
|
+
},
|
|
717
|
+
"relationships": [],
|
|
718
|
+
"shortDescription": {
|
|
719
|
+
"markdown": "CVE-2020-28483: Inconsistent interpretation of HTTP Requests in github.com/gin-gonic/gin",
|
|
720
|
+
"text": "CVE-2020-28483: Inconsistent interpretation of HTTP Requests in github.com/gin-gonic/gin"
|
|
721
|
+
}
|
|
722
|
+
},
|
|
723
|
+
{
|
|
724
|
+
"deprecatedIds": [
|
|
725
|
+
"CVE-2022-29526",
|
|
726
|
+
"BIT-golang-2022-29526",
|
|
727
|
+
"GO-2022-0493",
|
|
728
|
+
"GHSA-p782-xgp4-8hr8"
|
|
729
|
+
],
|
|
730
|
+
"fullDescription": {
|
|
731
|
+
"markdown": "When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.",
|
|
732
|
+
"text": "When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible."
|
|
733
|
+
},
|
|
734
|
+
"help": {
|
|
735
|
+
"markdown": "**Your dependency is vulnerable to [CVE-2022-29526](https://osv.dev/CVE-2022-29526)**\n(Also published as: [GO-2022-0493](https://osv.dev/GO-2022-0493), [GHSA-p782-xgp4-8hr8](https://osv.dev/GHSA-p782-xgp4-8hr8), ).\n\n## [GO-2022-0493](https://osv.dev/GO-2022-0493)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.\n\n\u003c/details\u003e\n\n## [GHSA-p782-xgp4-8hr8](https://osv.dev/GHSA-p782-xgp4-8hr8)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Go before 1.17.10 and 1.18.x before 1.18.2 has Incorrect Privilege Reporting in syscall. When called with a non-zero flags parameter, the Faccessat function could incorrectly report that a file is accessible.\n\u003e \n\u003e ### Specific Go Packages Affected\n\u003e golang.org/x/sys/unix\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/go/gomodules/go.mod | golang.org/x/sys | 0.0.0-20190222072716-a9d3bda3a223 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-p782-xgp4-8hr8 | golang.org/x/sys | 0.0.0-20220412211240-33da011f77ad |\n| GO-2022-0493 | stdlib | 1.17.10, 1.18.2 |\n| GO-2022-0493 | golang.org/x/sys | 0.0.0-20220412211240-33da011f77ad |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/go/gomodules/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2022-29526\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
|
|
736
|
+
"text": "**Your dependency is vulnerable to [CVE-2022-29526](https://osv.dev/CVE-2022-29526)**\n(Also published as: [GO-2022-0493](https://osv.dev/GO-2022-0493), [GHSA-p782-xgp4-8hr8](https://osv.dev/GHSA-p782-xgp4-8hr8), ).\n\n## [GO-2022-0493](https://osv.dev/GO-2022-0493)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e When called with a non-zero flags parameter, the Faccessat function can incorrectly report that a file is accessible.\n\n\u003c/details\u003e\n\n## [GHSA-p782-xgp4-8hr8](https://osv.dev/GHSA-p782-xgp4-8hr8)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Go before 1.17.10 and 1.18.x before 1.18.2 has Incorrect Privilege Reporting in syscall. When called with a non-zero flags parameter, the Faccessat function could incorrectly report that a file is accessible.\n\u003e \n\u003e ### Specific Go Packages Affected\n\u003e golang.org/x/sys/unix\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/go/gomodules/go.mod | golang.org/x/sys | 0.0.0-20190222072716-a9d3bda3a223 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-p782-xgp4-8hr8 | golang.org/x/sys | 0.0.0-20220412211240-33da011f77ad |\n| GO-2022-0493 | stdlib | 1.17.10, 1.18.2 |\n| GO-2022-0493 | golang.org/x/sys | 0.0.0-20220412211240-33da011f77ad |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/go/gomodules/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2022-29526\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
|
|
737
|
+
},
|
|
738
|
+
"id": "CVE-2022-29526",
|
|
739
|
+
"name": "CVE-2022-29526",
|
|
740
|
+
"properties": {
|
|
741
|
+
"security-severity": "5.3"
|
|
742
|
+
},
|
|
743
|
+
"relationships": [],
|
|
744
|
+
"shortDescription": {
|
|
745
|
+
"markdown": "CVE-2022-29526: Incorrect privilege reporting in syscall and golang.org/x/sys/unix",
|
|
746
|
+
"text": "CVE-2022-29526: Incorrect privilege reporting in syscall and golang.org/x/sys/unix"
|
|
747
|
+
}
|
|
748
|
+
},
|
|
749
|
+
{
|
|
750
|
+
"deprecatedIds": [
|
|
751
|
+
"CVE-2021-4235",
|
|
752
|
+
"GO-2021-0061",
|
|
753
|
+
"GHSA-r88r-gmrh-7j83"
|
|
754
|
+
],
|
|
755
|
+
"fullDescription": {
|
|
756
|
+
"markdown": "Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.",
|
|
757
|
+
"text": "Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector."
|
|
758
|
+
},
|
|
759
|
+
"help": {
|
|
760
|
+
"markdown": "**Your dependency is vulnerable to [CVE-2021-4235](https://osv.dev/CVE-2021-4235)**\n(Also published as: [GO-2021-0061](https://osv.dev/GO-2021-0061), [GHSA-r88r-gmrh-7j83](https://osv.dev/GHSA-r88r-gmrh-7j83), ).\n\n## [GO-2021-0061](https://osv.dev/GO-2021-0061)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.\n\n\u003c/details\u003e\n\n## [GHSA-r88r-gmrh-7j83](https://osv.dev/GHSA-r88r-gmrh-7j83)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/go/gomodules/go.mod | gopkg.in/yaml.v2 | 2.2.2 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-r88r-gmrh-7j83 | gopkg.in/yaml.v2 | 2.2.3 |\n| GO-2021-0061 | gopkg.in/yaml.v2 | 2.2.3 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/go/gomodules/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2021-4235\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
|
|
761
|
+
"text": "**Your dependency is vulnerable to [CVE-2021-4235](https://osv.dev/CVE-2021-4235)**\n(Also published as: [GO-2021-0061](https://osv.dev/GO-2021-0061), [GHSA-r88r-gmrh-7j83](https://osv.dev/GHSA-r88r-gmrh-7j83), ).\n\n## [GO-2021-0061](https://osv.dev/GO-2021-0061)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.\n\n\u003c/details\u003e\n\n## [GHSA-r88r-gmrh-7j83](https://osv.dev/GHSA-r88r-gmrh-7j83)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/go/gomodules/go.mod | gopkg.in/yaml.v2 | 2.2.2 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-r88r-gmrh-7j83 | gopkg.in/yaml.v2 | 2.2.3 |\n| GO-2021-0061 | gopkg.in/yaml.v2 | 2.2.3 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/go/gomodules/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2021-4235\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
|
|
762
|
+
},
|
|
763
|
+
"id": "CVE-2021-4235",
|
|
764
|
+
"name": "CVE-2021-4235",
|
|
765
|
+
"properties": {
|
|
766
|
+
"security-severity": "5.5"
|
|
767
|
+
},
|
|
768
|
+
"relationships": [],
|
|
769
|
+
"shortDescription": {
|
|
770
|
+
"markdown": "CVE-2021-4235: Denial of service in gopkg.in/yaml.v2",
|
|
771
|
+
"text": "CVE-2021-4235: Denial of service in gopkg.in/yaml.v2"
|
|
772
|
+
}
|
|
773
|
+
},
|
|
774
|
+
{
|
|
775
|
+
"deprecatedIds": [
|
|
776
|
+
"CVE-2019-11254",
|
|
777
|
+
"GO-2020-0036",
|
|
778
|
+
"GHSA-wxc4-f4m6-wwqv"
|
|
779
|
+
],
|
|
780
|
+
"fullDescription": {
|
|
781
|
+
"markdown": "Due to unbounded aliasing, a crafted YAML file can cause consumption of significant system resources. If parsing user supplied input, this may be used as a denial of service vector.",
|
|
782
|
+
"text": "Due to unbounded aliasing, a crafted YAML file can cause consumption of significant system resources. If parsing user supplied input, this may be used as a denial of service vector."
|
|
783
|
+
},
|
|
784
|
+
"help": {
|
|
785
|
+
"markdown": "**Your dependency is vulnerable to [CVE-2019-11254](https://osv.dev/CVE-2019-11254)**\n(Also published as: [GO-2020-0036](https://osv.dev/GO-2020-0036), [GHSA-wxc4-f4m6-wwqv](https://osv.dev/GHSA-wxc4-f4m6-wwqv), ).\n\n## [GO-2020-0036](https://osv.dev/GO-2020-0036)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Due to unbounded aliasing, a crafted YAML file can cause consumption of significant system resources. If parsing user supplied input, this may be used as a denial of service vector.\n\n\u003c/details\u003e\n\n## [GHSA-wxc4-f4m6-wwqv](https://osv.dev/GHSA-wxc4-f4m6-wwqv)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/go/gomodules/go.mod | gopkg.in/yaml.v2 | 2.2.2 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-wxc4-f4m6-wwqv | gopkg.in/yaml.v2 | 2.2.8 |\n| GO-2020-0036 | gopkg.in/yaml.v2 | 2.2.8 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/go/gomodules/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2019-11254\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n",
|
|
786
|
+
"text": "**Your dependency is vulnerable to [CVE-2019-11254](https://osv.dev/CVE-2019-11254)**\n(Also published as: [GO-2020-0036](https://osv.dev/GO-2020-0036), [GHSA-wxc4-f4m6-wwqv](https://osv.dev/GHSA-wxc4-f4m6-wwqv), ).\n\n## [GO-2020-0036](https://osv.dev/GO-2020-0036)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e Due to unbounded aliasing, a crafted YAML file can cause consumption of significant system resources. If parsing user supplied input, this may be used as a denial of service vector.\n\n\u003c/details\u003e\n\n## [GHSA-wxc4-f4m6-wwqv](https://osv.dev/GHSA-wxc4-f4m6-wwqv)\n\n\u003cdetails\u003e\n\u003csummary\u003eDetails\u003c/summary\u003e\n\n\u003e The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.\n\n\u003c/details\u003e\n\n---\n\n### Affected Packages\n\n| Source | Package Name | Package Version |\n| --- | --- | --- |\n| lockfile:/Users/john.doe/projects/go/gomodules/go.mod | gopkg.in/yaml.v2 | 2.2.2 |\n\n## Remediation\n\nTo fix these vulnerabilities, update the vulnerabilities past the listed fixed versions below.\n\n### Fixed Versions\n\n| Vulnerability ID | Package Name | Fixed Version |\n| --- | --- | --- |\n| GHSA-wxc4-f4m6-wwqv | gopkg.in/yaml.v2 | 2.2.8 |\n| GO-2020-0036 | gopkg.in/yaml.v2 | 2.2.8 |\n\nIf you believe these vulnerabilities do not affect your code and wish to ignore them, add them to the ignore list in an\n`osv-scanner.toml` file located in the same directory as the lockfile containing the vulnerable dependency.\n\nSee the format and more options in our documentation here: https://google.github.io/osv-scanner/configuration/\n\nAdd or append these values to the following config files to ignore this vulnerability:\n\n`/Users/john.doe/projects/go/gomodules/osv-scanner.toml`\n\n```\n[[IgnoredVulns]]\nid = \"CVE-2019-11254\"\nreason = \"Your reason for ignoring this vulnerability\"\n```\n"
|
|
787
|
+
},
|
|
788
|
+
"id": "CVE-2019-11254",
|
|
789
|
+
"name": "CVE-2019-11254",
|
|
790
|
+
"properties": {
|
|
791
|
+
"security-severity": "6.5"
|
|
792
|
+
},
|
|
793
|
+
"relationships": [],
|
|
794
|
+
"shortDescription": {
|
|
795
|
+
"markdown": "CVE-2019-11254: Excessive resource consumption in YAML parsing in gopkg.in/yaml.v2",
|
|
796
|
+
"text": "CVE-2019-11254: Excessive resource consumption in YAML parsing in gopkg.in/yaml.v2"
|
|
797
|
+
}
|
|
798
|
+
}
|
|
799
|
+
],
|
|
800
|
+
"supportedTaxonomies": [],
|
|
801
|
+
"taxa": [],
|
|
802
|
+
"version": "2.2.0"
|
|
803
|
+
},
|
|
804
|
+
"extensions": []
|
|
805
|
+
},
|
|
806
|
+
"translations": [],
|
|
807
|
+
"versionControlProvenance": [],
|
|
808
|
+
"webRequests": [],
|
|
809
|
+
"webResponses": []
|
|
810
|
+
}
|
|
811
|
+
],
|
|
812
|
+
"properties": {}
|
|
813
|
+
}
|