Go Parse Function Vulnerability

MEDIUM (5.3) No Patch (51 days)

Threat Intelligence

Low Risk
EPSS Score: 0.03% chance of exploitation (percentile: 6%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

The Go Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. This vulnerability allows an attacker to inject malicious URLs, potentially leading to code execution or other security issues.

Am I affected?

You're affected if you use Go versions 1.17 and later (due to changes made in Go 1.18). Check with: go version command to verify your Go version.

Affected Packages

go: github.com/golang/go

Affected Products

The Go Team / Go

How to fix

Upgrade to Go 1.18 or later.
- Immediate mitigations:
- Avoid using the net/url.Parse() function for URL parsing, as it can be exploited by an attacker.
- Use a secure alternative, such as the url package's ParseURL() function.