From b17fc573a90bbe0b88496dfb058152dc5fbf9273 Mon Sep 17 00:00:00 2001 From: William Collishaw Date: Wed, 22 Oct 2025 18:58:56 -0600 Subject: [PATCH] Improve GHSA-8pjc-487g-w6p2 --- .../GHSA-8pjc-487g-w6p2.json | 28 +++++++++++++++++-- 1 file changed, 26 insertions(+), 2 deletions(-) diff --git a/advisories/unreviewed/2025/09/GHSA-8pjc-487g-w6p2/GHSA-8pjc-487g-w6p2.json b/advisories/unreviewed/2025/09/GHSA-8pjc-487g-w6p2/GHSA-8pjc-487g-w6p2.json index e911660c41347..a897923870202 100644 --- a/advisories/unreviewed/2025/09/GHSA-8pjc-487g-w6p2/GHSA-8pjc-487g-w6p2.json +++ b/advisories/unreviewed/2025/09/GHSA-8pjc-487g-w6p2/GHSA-8pjc-487g-w6p2.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-8pjc-487g-w6p2", - "modified": "2025-09-24T15:31:13Z", + "modified": "2025-09-24T15:32:15Z", "published": "2025-09-22T21:30:29Z", "aliases": [ "CVE-2025-47910" ], + "summary": "CrossOriginProtection insecure bypass patterns not limited to exact matches", "details": "When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.", "severity": [ { @@ -13,7 +14,30 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "net/http" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.25.0" + }, + { + "fixed": "1.25.1" + } + ] + } + ], + "versions": [ + "1.25.0" + ] + } + ], "references": [ { "type": "ADVISORY",