Search for vulnerabilities
Vulnerability details: VCID-kuxv-41y8-aaaj
Vulnerability ID VCID-kuxv-41y8-aaaj
Aliases CVE-2023-24538
Summary Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g. "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template.Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution.
Status Published
Exploitability 0.5
Weighted Severity 8.8
Risk 4.4
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 9.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24538.json
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00335 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00477 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00477 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00477 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00477 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00477 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00491 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00491 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00491 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00491 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00636 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00646 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00683 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00683 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00683 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00683 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00736 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00736 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00736 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00736 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00736 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00861 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00861 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00861 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00861 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00861 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.00861 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.05894 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.23512 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.23512 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.23512 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.23512 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.23512 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.23512 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.23512 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.23512 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.23512 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.23512 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.23512 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.23512 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
epss 0.64282 https://api.first.org/data/v1/epss?cve=CVE-2023-24538
cvssv3.1 5.9 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 9.8 https://go.dev/cl/482079
cvssv3.1 9.8 https://go.dev/cl/482079
ssvc Track https://go.dev/cl/482079
ssvc Track https://go.dev/cl/482079
cvssv3.1 9.8 https://go.dev/issue/59234
cvssv3.1 9.8 https://go.dev/issue/59234
ssvc Track https://go.dev/issue/59234
ssvc Track https://go.dev/issue/59234
cvssv3.1 9.8 https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
cvssv3.1 9.8 https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
ssvc Track https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
ssvc Track https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2023-24538
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2023-24538
cvssv3.1 9.8 https://pkg.go.dev/vuln/GO-2023-1703
ssvc Track https://pkg.go.dev/vuln/GO-2023-1703
cvssv3.1 9.8 https://security.gentoo.org/glsa/202311-09
ssvc Track https://security.gentoo.org/glsa/202311-09
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24538.json
https://api.first.org/data/v1/epss?cve=CVE-2023-24538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24538
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://go.dev/cl/482079
https://go.dev/issue/59234
https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
https://pkg.go.dev/vuln/GO-2023-1703
https://security.netapp.com/advisory/ntap-20241115-0007/
2184481 https://bugzilla.redhat.com/show_bug.cgi?id=2184481
cpe:2.3:a:golang:go:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
CVE-2023-24538 https://nvd.nist.gov/vuln/detail/CVE-2023-24538
GLSA-202311-09 https://security.gentoo.org/glsa/202311-09
RHSA-2023:3318 https://access.redhat.com/errata/RHSA-2023:3318
RHSA-2023:3319 https://access.redhat.com/errata/RHSA-2023:3319
RHSA-2023:3323 https://access.redhat.com/errata/RHSA-2023:3323
RHSA-2023:3366 https://access.redhat.com/errata/RHSA-2023:3366
RHSA-2023:3367 https://access.redhat.com/errata/RHSA-2023:3367
RHSA-2023:3445 https://access.redhat.com/errata/RHSA-2023:3445
RHSA-2023:3450 https://access.redhat.com/errata/RHSA-2023:3450
RHSA-2023:3455 https://access.redhat.com/errata/RHSA-2023:3455
RHSA-2023:3536 https://access.redhat.com/errata/RHSA-2023:3536
RHSA-2023:3540 https://access.redhat.com/errata/RHSA-2023:3540
RHSA-2023:3612 https://access.redhat.com/errata/RHSA-2023:3612
RHSA-2023:3624 https://access.redhat.com/errata/RHSA-2023:3624
RHSA-2023:3918 https://access.redhat.com/errata/RHSA-2023:3918
RHSA-2023:3943 https://access.redhat.com/errata/RHSA-2023:3943
RHSA-2023:4003 https://access.redhat.com/errata/RHSA-2023:4003
RHSA-2023:4093 https://access.redhat.com/errata/RHSA-2023:4093
RHSA-2023:4335 https://access.redhat.com/errata/RHSA-2023:4335
RHSA-2023:4470 https://access.redhat.com/errata/RHSA-2023:4470
RHSA-2023:4627 https://access.redhat.com/errata/RHSA-2023:4627
RHSA-2023:4657 https://access.redhat.com/errata/RHSA-2023:4657
RHSA-2023:4664 https://access.redhat.com/errata/RHSA-2023:4664
RHSA-2023:4986 https://access.redhat.com/errata/RHSA-2023:4986
RHSA-2023:5964 https://access.redhat.com/errata/RHSA-2023:5964
RHSA-2023:6346 https://access.redhat.com/errata/RHSA-2023:6346
RHSA-2023:6363 https://access.redhat.com/errata/RHSA-2023:6363
RHSA-2023:6402 https://access.redhat.com/errata/RHSA-2023:6402
RHSA-2023:6473 https://access.redhat.com/errata/RHSA-2023:6473
RHSA-2023:6474 https://access.redhat.com/errata/RHSA-2023:6474
RHSA-2023:6938 https://access.redhat.com/errata/RHSA-2023:6938
RHSA-2023:6939 https://access.redhat.com/errata/RHSA-2023:6939
RHSA-2024:0746 https://access.redhat.com/errata/RHSA-2024:0746
RHSA-2024:2944 https://access.redhat.com/errata/RHSA-2024:2944
USN-6038-1 https://usn.ubuntu.com/6038-1/
USN-6038-2 https://usn.ubuntu.com/6038-2/
USN-6140-1 https://usn.ubuntu.com/6140-1/
USN-7061-1 https://usn.ubuntu.com/7061-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24538.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://go.dev/cl/482079
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://go.dev/cl/482079
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-12T17:02:13Z/ Found at https://go.dev/cl/482079

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-12T17:02:13Z/ Found at https://go.dev/cl/482079
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://go.dev/issue/59234
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://go.dev/issue/59234
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-12T17:02:13Z/ Found at https://go.dev/issue/59234

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-12T17:02:13Z/ Found at https://go.dev/issue/59234
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-12T17:02:13Z/ Found at https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-12T17:02:13Z/ Found at https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-24538
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-24538
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://pkg.go.dev/vuln/GO-2023-1703
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-12T17:02:13Z/ Found at https://pkg.go.dev/vuln/GO-2023-1703
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://security.gentoo.org/glsa/202311-09
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-12T17:02:13Z/ Found at https://security.gentoo.org/glsa/202311-09
Exploit Prediction Scoring System (EPSS)
Percentile 0.55664
EPSS Score 0.00335
Published At May 1, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.