ZITADEL Go 的 GRPC 示例代码漏洞 - GO-2024-2687 HTTP/2 CONTINUATION 洪水攻击 net/http

CVE编号

N/A

利用情况

暂无

补丁情况

N/A

披露时间

2024-07-15
漏洞描述
Applications using the zitadel-go v3 library (next branch) might be impacted by package vulnerabilities. The output of govulncheck suggests that only example code seems to be impacted, based on 1 of the 3 potential vulnerabilities. This vulnerability is located in the transitive dependency golang.org/x/net v0.19.0, CVE-2023-45288
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
CVSS3评分
N/A
  • 攻击路径
    N/A
  • 攻击复杂度
    N/A
  • 权限要求
    N/A
  • 影响范围
    N/A
  • 用户交互
    N/A
  • 可用性
    N/A
  • 保密性
    N/A
  • 完整性
    N/A
CWE-ID 漏洞类型
阿里云安全产品覆盖情况