GHSA-gj6x-q8rh-wj6x

Suggest an improvement
Source
https://github.com/advisories/GHSA-gj6x-q8rh-wj6x
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-gj6x-q8rh-wj6x/GHSA-gj6x-q8rh-wj6x.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-gj6x-q8rh-wj6x
Published
2026-02-26T22:48:00Z
Modified
2026-02-26T23:15:25.742657Z
Severity
  • 7.1 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Curio exposes database credentials to users with network access through verbose HTTP error responses
Details

Summary

Multiple HTTP handlers in Curio passed raw database error messages to HTTP clients via http.Error(). When the PostgreSQL/YugabyteDB driver (pgx) returned errors, these could contain the database connection string — including hostname, port, username, and password. Additionally, the internal connection string was constructed with the plaintext password embedded in the URL, which was also included in startup error messages and could surface in logs.

Details

Three components were affected:

  1. PDP handlers (pdp/handlers.go) — 18+ HTTP error paths passed err.Error() directly to HTTP responses. While these endpoints require ECDSA JWT authentication, an authenticated client (e.g., a FilPay service) that triggered a database error would receive the raw pgx error in the HTTP response body. Present since PDP was introduced in v1.25.1.

  2. Market mk12 deal status (market/mk12/mk12_utils.go) — The GetDealStatus handler included err.Error() in error responses: "failed to query the db for deal status: %s". Present since v1.24.3.

  3. Market mk20 auth middleware (market/mk20/http/http.go) — Authentication error responses included err.Error(), potentially leaking database error details during auth flows. Present since v1.27.2.

Root Cause

The database connection string was constructed as:

postgresql://username:password@host:port/database?...

The plaintext password was embedded directly in the URL. When pgx returned connection or query errors, the error text could contain fragments of this connection string. HTTP handlers forwarded these errors verbatim to clients.

Impact

An attacker with network access to Curio's PDP or Market HTTP endpoints and valid authentication credentials could intentionally trigger database errors (e.g., by sending malformed requests that cause SQL failures) and extract the YugabyteDB connection credentials from the error response. With these credentials, the attacker could directly access the database, which serves as Curio's control plane.

Per Curio's security boundary documentation, these endpoints are expected to be on a trusted network. However, defense-in-depth requires that credentials are never exposed through HTTP responses regardless of network trust assumptions.

Remediation (PR #919)

  1. Connection string password masking: The password in the connection string is replaced with ********. The real password is set separately via cfg.ConnConfig.Password, so it never appears in error messages or logs.

  2. HTTP handler sanitization: All affected handlers now log the detailed error server-side and return a generic error message to the HTTP client.

  3. Error filter (errFilter): A new function in the database layer detects and redacts any error messages containing keywords like "password", "host", "port", or "://" before they can propagate.

  4. Prometheus metrics cleanup: Database connection metrics that could expose connection details were removed from the metrics endpoint.

  5. Security boundary documentation: A new section documents what Curio expects operators to secure.

Resources

  • Fix: https://github.com/filecoin-project/curio/pull/919
  • Patched release: v1.27.3-rc2
Database specific
{
    "cwe_ids": [
        "CWE-209",
        "CWE-532"
    ],
    "severity": "HIGH",
    "nvd_published_at": null,
    "github_reviewed_at": "2026-02-26T22:48:00Z",
    "github_reviewed": true
}
References

Affected packages

Go / github.com/filecoin-project/curio

Package

Name
github.com/filecoin-project/curio
View open source insights on deps.dev
Purl
pkg:golang/github.com/filecoin-project/curio

Affected ranges

Type
SEMVER
Events
Introduced
1.24.3
Fixed
1.27.3-rc2

Database specific

last_known_affected_version_range
"<= 1.27.2"
source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/02/GHSA-gj6x-q8rh-wj6x/GHSA-gj6x-q8rh-wj6x.json"