|
|
Message-ID: <9c97b732-93db-41b0-916d-7b3aaa17afa5@oracle.com>
Date: Fri, 7 Mar 2025 11:58:20 -0800
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: Go CVE-2025-22870: proxy bypass using IPv6 zone IDs
https://groups.google.com/g/golang-announce/c/4t3lzH3I0eI/m/b42ImqrBAQAJ
announces the release of Go versions 1.24.1 and 1.23.7, including a
security fix for:
> net/http, x/net/proxy, x/net/http/httpproxy: proxy bypass using IPv6 zone IDs
>
> Matching of hosts against proxy patterns could improperly treat an IPv6 zone ID
> as a hostname component. For example, when the NO_PROXY environment variable was
> set to "*.example.com", a request to "[::1%25.example.com]:80` would incorrectly
> match and not be proxied.
>
> Thanks to Juho Forsén of Mattermost for reporting this issue.
>
> This is CVE-2025-22870 and Go issue https://go.dev/issue/71984.
--
-Alan Coopersmith- alan.coopersmith@...cle.com
Oracle Solaris Engineering - https://blogs.oracle.com/solaris
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.