GO-2022-0391

Source
https://pkg.go.dev/vuln/GO-2022-0391
Import Source
https://vuln.go.dev/ID/GO-2022-0391.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2022-0391
Aliases
Published
2022-07-01T20:10:56Z
Modified
2024-05-20T16:03:47Z
Summary
Exposure of unencrypted plaintext hash in github.com/aws/aws-sdk-go
Details

The AWS S3 Crypto SDK sends an unencrypted hash of the plaintext alongside the ciphertext as a metadata field. This hash can be used to brute force the plaintext, if the hash is readable to the attacker.

AWS now blocks this metadata field, but older SDK versions still send it.

Database specific
{
    "review_status": "REVIEWED",
    "url": "https://pkg.go.dev/vuln/GO-2022-0391"
}
References

Affected packages

Go / github.com/aws/aws-sdk-go

Package

Name
github.com/aws/aws-sdk-go
View open source insights on deps.dev
Purl
pkg:golang/github.com/aws/aws-sdk-go

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.34.0

Ecosystem specific

{
    "imports": [
        {
            "path": "github.com/aws/aws-sdk-go/service/s3/s3crypto",
            "symbols": [
                "DecryptionClient.GetObject",
                "DecryptionClient.GetObjectWithContext",
                "EncryptionClient.PutObject",
                "EncryptionClient.PutObjectWithContext",
                "S3LoadStrategy.Load",
                "S3SaveStrategy.Save",
                "defaultV2LoadStrategy.Load",
                "encodeMeta",
                "kmsKeyHandler.DecryptKey",
                "kmsKeyHandler.DecryptKeyWithContext",
                "kmsKeyHandler.GenerateCipherData",
                "kmsKeyHandler.GenerateCipherDataWithContext"
            ]
        }
    ]
}