GO-2021-0107

Source
https://pkg.go.dev/vuln/GO-2021-0107
Import Source
https://vuln.go.dev/ID/GO-2021-0107.json
JSON Data
https://api.test.osv.dev/v1/vulns/GO-2021-0107
Aliases
Published
2021-07-28T18:08:05Z
Modified
2024-05-20T16:03:47Z
Summary
Panic or authentication bypass in github.com/ecnepsnai/web
Details

Web Sockets do not execute any AuthenticateMethod methods which may be set, leading to a nil pointer dereference if the returned UserData pointer is assumed to be non-nil, or authentication bypass.

This issue only affects WebSockets with an AuthenticateMethod hook. Request handlers that do not explicitly use WebSockets are not vulnerable.

Database specific
{
    "review_status": "REVIEWED",
    "url": "https://pkg.go.dev/vuln/GO-2021-0107"
}
References

Affected packages

Go / github.com/ecnepsnai/web

Package

Name
github.com/ecnepsnai/web
View open source insights on deps.dev
Purl
pkg:golang/github.com/ecnepsnai/web

Affected ranges

Type
SEMVER
Events
Introduced
1.4.0
Fixed
1.5.2

Ecosystem specific

{
    "imports": [
        {
            "path": "github.com/ecnepsnai/web",
            "symbols": [
                "Server.Socket",
                "Server.socketHandler"
            ]
        }
    ]
}