Vulnerability Name: | CVE-2023-24538 (CCN-252178) | ||||||||||||
Assigned: | 2023-04-05 | ||||||||||||
Published: | 2023-04-05 | ||||||||||||
Updated: | 2023-04-17 | ||||||||||||
Summary: | Golang Go could allow a remote attacker to execute arbitrary code on the system, caused by the failure to properly consider backticks (`) as Javascript string delimiters. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system. | ||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2023-24538 Source: CCN Type: Red Hat Bugzilla Bug 2184481 (CVE-2023-24538) - CVE-2023-24538 golang: html/template: backticks not treated as string delimiters Source: XF Type: UNKNOWN golang-cve202324538-code-exec(252178) Source: CCN Type: Go GIT Repository html/template: backticks not treated as string delimiters (CVE-2023-24538) #59234 Source: CCN Type: GO-2023-1703 html/template Source: CCN Type: SNYK-ALPINE317-GO-5417942 Arbitrary Code Injection Source: CCN Type: IBM Security Bulletin 6995489 (CICS TX Standard) Vulnerability in Golang Go could affect IBM CICS TX Standard [CVE-2023-24538] Source: CCN Type: IBM Security Bulletin 6995491 (CICS TX Advanced) Vulnerability in Golang Go could affect IBM CICS TX Advanced [CVE-2023-24538] Source: CCN Type: IBM Security Bulletin 6998391 (Cloud Pak for Integration) Platform Navigator and Automation Assets in IBM Cloud Pak for Integration are vulnerable to multiple vulnerabilities in Go Source: CCN Type: IBM Security Bulletin 6998399 (Spectrum Copy Data Management) Vulnerabilities in Golang Go might affect IBM Spectrum Copy Data Management ( CVE-2023-24536, CVE-2023-24537, CVE-2023-24538) Source: CCN Type: IBM Security Bulletin 7004575 (Watson Discovery) IBM Watson Discovery Cartridge for IBM Cloud Pak for Data affected by vulnerability in Golang Go Source: CCN Type: IBM Security Bulletin 7005479 (Cloud Pak for Network Automation) IBM Cloud Pak for Network Automation 2.4.7 fixes multiple security vulnerabilities Source: CCN Type: IBM Security Bulletin 7005589 (Spectrum Protect Plus) Vulnerabilities in Apache Commons, Tomcat, Go, libcurl, OpenSSL, Python, Node.js, and Linux can affect IBM Spectrum Protect Plus. Source: CCN Type: IBM Security Bulletin 7005869 (Cloud Pak for Integration) Operations Dashboard is vulnerable to multiple vulnerabilities in Golang Source: CCN Type: IBM Security Bulletin 7008407 (Robotic Process Automation for Cloud Pak) Multiple operator framework security vulnerabilities may affect IBM Robotic Process Automation for Cloud Pak Source: CCN Type: IBM Security Bulletin 7009745 (Cloud Pak for Watson AIOps) Multiple Vulnerabilities in CloudPak for Watson AIOps Source: CCN Type: IBM Security Bulletin 7010325 (Cloud Pak System Software Suite) Vulnerability in Golang Go affects IBM Cloud Pak System [CVE-2023-24538] Source: CCN Type: IBM Security Bulletin 7011697 (Storage Protect Plus Container Agent) Vulnerabilities in Python, OpenSSH, Golang Go, Minio and Redis may affect IBM Spectrum Protect Plus Container backup and restore for Kubernetes and OpenShift Source: CCN Type: IBM Security Bulletin 7014403 (Event Streams) IBM Event Streams is affected by multiple Golang Go vulnerabilities Source: CCN Type: IBM Security Bulletin 7015019 (Watson Speech Services Cartridge for Cloud Pak for Data) IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data is vulnerable to arbitrary code execution in Golang Go [CVE-2023-24538] Source: CCN Type: IBM Security Bulletin 7016688 (MQ Operator) IBM MQ Operator and Queue manager container images are vulnerable to multiple vulnerabilities from openssl-libs, libssh, libarchive, sqlite and go-toolset | ||||||||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |