Skip to content

google.golang.org/grpc-v1.69.0: 3 vulnerabilities (highest severity is: 7.5) #115

@ibm-mend-app

Description

@ibm-mend-app
Vulnerable Library - google.golang.org/grpc-v1.69.0

Path to dependency file: /go.mod

Path to vulnerable library: /go/pkg/mod/cache/download/golang.org/x/net/@v/v0.32.0.mod

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (google.golang.org/grpc-v1.69.0 version) Remediation Possible**
CVE-2025-22868 High 7.5 golang.org/x/oauth2-v0.24.0 Transitive N/A*
CVE-2025-22870 Medium 5.5 golang.org/x/net-v0.32.0 Transitive N/A*
CVE-2024-45338 Medium 5.3 golang.org/x/net-v0.32.0 Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2025-22868

Vulnerable Library - golang.org/x/oauth2-v0.24.0

Library home page: https://proxy.golang.org/golang.org/x/oauth2/@v/v0.24.0.zip

Path to dependency file: /go.mod

Path to vulnerable library: /go/pkg/mod/cache/download/golang.org/x/oauth2/@v/v0.24.0.mod

Dependency Hierarchy:

  • google.golang.org/grpc-v1.69.0 (Root Library)
    • golang.org/x/oauth2-v0.24.0 (Vulnerable Library)

Found in base branch: develop

Vulnerability Details

An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.

Publish Date: 2025-02-26

URL: CVE-2025-22868

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://pkg.go.dev/vuln/GO-2025-3488

Release Date: 2025-02-26

Fix Resolution: v0.27.0

CVE-2025-22870

Vulnerable Library - golang.org/x/net-v0.32.0

Library home page: https://proxy.golang.org/golang.org/x/net/@v/v0.32.0.zip

Path to dependency file: /go.mod

Path to vulnerable library: /go/pkg/mod/cache/download/golang.org/x/net/@v/v0.32.0.mod

Dependency Hierarchy:

  • google.golang.org/grpc-v1.69.0 (Root Library)
    • golang.org/x/net-v0.32.0 (Vulnerable Library)

Found in base branch: develop

Vulnerability Details

In Go net/http, x/net/proxy, x/net/http/httpproxy there is a proxy bypass vulnerability using IPv6 zone IDs. Matching of hosts against proxy patterns could improperly treat an IPv6 zone ID
as a hostname component. For example, when the NO_PROXY environment variable was
set to "*.example.com", a request to "[::1%25.example.com]:80` would incorrectly
match and not be proxied. This affects versions before 1.23.7 and 1.24.x before 1.24.1.

Publish Date: 2025-03-08

URL: CVE-2025-22870

CVSS 3 Score Details (5.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: golang/go@334de79

Release Date: 2025-03-08

Fix Resolution: go1.24.1

CVE-2024-45338

Vulnerable Library - golang.org/x/net-v0.32.0

Library home page: https://proxy.golang.org/golang.org/x/net/@v/v0.32.0.zip

Path to dependency file: /go.mod

Path to vulnerable library: /go/pkg/mod/cache/download/golang.org/x/net/@v/v0.32.0.mod

Dependency Hierarchy:

  • google.golang.org/grpc-v1.69.0 (Root Library)
    • golang.org/x/net-v0.32.0 (Vulnerable Library)

Found in base branch: develop

Vulnerability Details

An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.

Publish Date: 2024-12-18

URL: CVE-2024-45338

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: golang/go#70906

Release Date: 2024-12-18

Fix Resolution: github.com/golang/net-v0.33.0

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions