Vulnerability Report: GO-2024-3163
- CVE-2024-47182
- Affects: github.com/amir20/dozzle
- Published: Oct 09, 2024
- Unreviewed
Dozzle uses unsafe hash for passwords in github.com/amir20/dozzle. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/amir20/dozzle before v8.5.3.
For detailed information about this vulnerability, visit https://nvd.nist.gov/vuln/detail/CVE-2024-47182.
Affected Modules
-
PathGo VersionsCustom Versions*
-
all versions, no known fixedbefore 8.5.3
*Custom versions, which can't be mapped automatically to standard Go module versions, are ignored by govulncheck
. (See this note on versions for more details.)
Aliases
References
- https://nvd.nist.gov/vuln/detail/CVE-2024-47182
- https://github.com/amir20/dozzle/commit/de79f03aa3dbe5bb1e154a7e8d3dccbd229f3ea3
- https://github.com/amir20/dozzle/security/advisories/GHSA-w7qr-q9fh-fj35
- https://vuln.go.dev/ID/GO-2024-3163.json
Feedback
This report is unreviewed. It was automatically generated from a third-party source and its details have not been verified by the Go team.
See anything missing or incorrect?
Suggest an edit to this report.