Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.
References
Link | Resource |
---|---|
https://go.dev/cl/491616 | Patch |
https://go.dev/issue/59721 | Issue Tracking Patch |
https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU | Mailing List Release Notes |
https://pkg.go.dev/vuln/GO-2023-1752 | Vendor Advisory |
https://go.dev/cl/491616 | Patch |
https://go.dev/issue/59721 | Issue Tracking Patch |
https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU | Mailing List Release Notes |
https://pkg.go.dev/vuln/GO-2023-1752 | Vendor Advisory |
https://security.netapp.com/advisory/ntap-20241115-0008/ |
Configurations
History
24 Jan 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-77 |
Information
Published : 2023-05-11 16:15
Updated : 2025-01-24 17:15
NVD link : CVE-2023-24540
Mitre link : CVE-2023-24540
CVE.ORG link : CVE-2023-24540
JSON object : View
Products Affected
golang
- go
CWE
NVD-CWE-noinfo
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')