Skip to content
This repository was archived by the owner on Nov 12, 2025. It is now read-only.

github.com/mutecomm/go-sqlcipher/v4-v4.4.0: 2 vulnerabilities (highest severity is: 5.5) #18

@ibm-mend-app

Description

@ibm-mend-app
Vulnerable Library - github.com/mutecomm/go-sqlcipher/v4-v4.4.0

Path to dependency file: /go.mod

Path to vulnerable library: /home/wss-scanner/go/pkg/mod/cache/download/golang.org/x/net/@v/v0.30.0.mod

Found in HEAD commit: a38d6324242b44e86f4799b7caed176ba9620b92

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (github.com/mutecomm/go-sqlcipher/v4-v4.4.0 version) Remediation Possible**
CVE-2025-22870 Medium 5.5 golang.org/x/net-v0.30.0 Transitive N/A*
CVE-2024-45338 Medium 5.3 golang.org/x/net-v0.30.0 Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

CVE-2025-22870

Vulnerable Library - golang.org/x/net-v0.30.0

Library home page: https://proxy.golang.org/golang.org/x/net/@v/v0.30.0.zip

Path to dependency file: /go.mod

Path to vulnerable library: /home/wss-scanner/go/pkg/mod/cache/download/golang.org/x/net/@v/v0.30.0.mod

Dependency Hierarchy:

  • github.com/mutecomm/go-sqlcipher/v4-v4.4.0 (Root Library)
    • golang.org/x/net-v0.30.0 (Vulnerable Library)

Found in HEAD commit: a38d6324242b44e86f4799b7caed176ba9620b92

Found in base branch: master

Vulnerability Details

In Go net/http, x/net/proxy, x/net/http/httpproxy there is a proxy bypass vulnerability using IPv6 zone IDs. Matching of hosts against proxy patterns could improperly treat an IPv6 zone ID
as a hostname component. For example, when the NO_PROXY environment variable was
set to "*.example.com", a request to "[::1%25.example.com]:80` would incorrectly
match and not be proxied. This affects versions before 1.23.7 and 1.24.x before 1.24.1.

Publish Date: 2025-03-08

URL: CVE-2025-22870

CVSS 3 Score Details (5.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: golang/go@334de79

Release Date: 2025-03-08

Fix Resolution: go1.24.1

CVE-2024-45338

Vulnerable Library - golang.org/x/net-v0.30.0

Library home page: https://proxy.golang.org/golang.org/x/net/@v/v0.30.0.zip

Path to dependency file: /go.mod

Path to vulnerable library: /home/wss-scanner/go/pkg/mod/cache/download/golang.org/x/net/@v/v0.30.0.mod

Dependency Hierarchy:

  • github.com/mutecomm/go-sqlcipher/v4-v4.4.0 (Root Library)
    • golang.org/x/net-v0.30.0 (Vulnerable Library)

Found in HEAD commit: a38d6324242b44e86f4799b7caed176ba9620b92

Found in base branch: master

Vulnerability Details

An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.

Publish Date: 2024-12-18

URL: CVE-2024-45338

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: golang/go#70906

Release Date: 2024-12-18

Fix Resolution: github.com/golang/net-v0.33.0

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions