Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS01cGY2LTJxd3gtcHhtMs4AA5zw

Go SDK for CloudEvents's use of WithRoundTripper to create a Client leaks credentials

Impact

What kind of vulnerability is it? Who is impacted?
Using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints.

The relevant code is here (also inline, emphasis added):

When the transport is populated with an authenticated transport such as:

... then http.DefaultClient is modified with the authenticated transport and will start to send Authorization tokens to
any endpoint it is used to contact!

Found and patched by: @tcnghia and @mattmoor

Patches

v.2.15.2

Permalink: https://github.com/advisories/GHSA-5pf6-2qwx-pxm2
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS01cGY2LTJxd3gtcHhtMs4AA5zw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 9 months ago
Updated: 9 months ago


Identifiers: GHSA-5pf6-2qwx-pxm2, CVE-2024-28110
References: Repository: https://github.com/cloudevents/sdk-go
Blast Radius: 0.0

Affected Packages

go:github.com/cloudevents/sdk-go/v2
Dependent packages: 1,102
Dependent repositories: 2,107
Downloads:
Affected Version Ranges: <= 2.15.1
Fixed in: 2.15.2
All affected versions: 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.6.0, 2.6.1, 2.7.0, 2.8.0, 2.9.0, 2.10.0, 2.10.1, 2.11.0, 2.12.0, 2.13.0, 2.14.0, 2.15.0, 2.15.1
All unaffected versions: 2.15.2