Upstream information
Description
beego is an open-source web framework for the Go programming language. Versions of beego prior to 2.3.4 use MD5 as a hashing algorithm. MD5 is no longer considered secure against well-funded opponents due to its vulnerability to collision attacks. Version 2.3.4 replaces MD5 with SHA256.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
CNA (GitHub) | |
---|---|
Base Score | 6.9 |
Vector | CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
Attack Vector | Network |
Attack Complexity | Low |
Attack Requirements | None |
Privileges Required | None |
User Interaction | None |
Vulnerable System Confidentiality Impact | None |
Vulnerable System Integrity Impact | Low |
Vulnerable System Availability Impact | None |
Subsequent System Confidentiality Impact | None |
Subsequent System Integrity Impact | None |
Subsequent System Availability Impact | None |
CVSSv4 Version | 4.0 |
SUSE Security Advisories:
- openSUSE-SU-2024:14603-1, published Fri Dec 20 18:51:47 2024
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
openSUSE Tumbleweed |
| Patchnames: openSUSE-Tumbleweed-2024-14603 |
SUSE Timeline for this CVE
CVE page created: Thu Dec 12 22:00:38 2024CVE page last modified: Fri Dec 20 19:59:05 2024