-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Plan to update golang.org/x/net package? #1329
Comments
the shared link doesn't work, can you share the CVE link from cve.org? and share the details on how it impacts blackbox exporter? we regularly update our dependencies but having more info would be helpful here. |
@electron0zero sure. Following is the vuln description:
It looks like the vuln may be exploited by an attacker on DoS. |
sorry, I don't think I understand the issue here. the CVE is for WordPress, and we are a Prometheus exporter. we don't have anything to do with WordPress. can you share the parts of the blackbox exporter code that's vulnerable to this CVE. Please do not report raw vulnerability scanner results. They are prone to false positives and cause the Prometheus team toil in verifying. Please verify vulnerability reports and include specific details as to which components are directly exploitable. |
Sorry some mistake, just updated comment with correct description. |
I looked through CVE-2023-44487, and I don't think blackbox exporter can be exploited here. we recommend folks to not expose blackbox_exporter on the internet, and also if they wish to do so, they should put it behind a reverse proxy or a Load Balancer. In those cases, the reverse proxy or the load balancer should prevent the HTTP2 denial of service attack that's described in CVE-2023-44487. for future reference, please share full details on the CVE and how it impacts blackbox exporter. It's hard to act on to scanner results, and it's not possible to evaluate the CVE in question when it's reported by a paid service that has it's own CVE numbering scheme, and no public info on the CVE. we have #1327, I will find some time to take a look at it. |
update: #1340 is merged, and updated golang.org/x/net to 0.33.0 |
Security vuln BDSA-2023-2733 is found in
golang.org/x/net
package. The fix is to update the package tov0.30.0
. The master branch currently hasv0.29.0
package. It would be good if there is plan to update this package in the upcoming release to fix the vuln.Please let me know if i can be of help work/test on it.
The text was updated successfully, but these errors were encountered: