[🐸 Frogbot] Update version of golang.org/x/oauth2 to 0.27.0 #4
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
📦 Vulnerable Dependencies
High
github.com/jfrog/jfrog-cli-security:v1.14.1
github.com/ktrysmt/go-bitbucket:v0.9.80
golang.org/x/oauth2:v0.20.0
🔖 Details
Vulnerability Details
Unbounded resource consumption in Go's x/oauth2/jws can lead to denial of service when an attacker client sends a malformed token.
🔬 JFrog Research Details
Description:
A design bug in Go
x/oauth2/jwsmodule may lead to denial of service when an attacker sends a malformed token to a server.The Verify function of Go's JWS module starts with:
If an attacker sends a token which has many dots (e.g. 100000) the
strings.Split()function might crash due to unexpected memory consumption which may lead to DoS.🐸 JFrog Frogbot