Update module golang.org/x/net to v0.38.0 [SECURITY]
This MR contains the following updates:
Package | Type | Update | Change |
---|---|---|---|
golang.org/x/net | require | minor |
v0.35.0 -> v0.38.0
|
HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net
CVE-2025-22870 / GHSA-qxp5-gwg8-xv66 / GO-2025-3503
More information
Details
Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net
CVE-2025-22870 / GHSA-qxp5-gwg8-xv66 / GO-2025-3503
More information
Details
Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.
Severity
- CVSS Score: 4.4 / 10 (Medium)
- Vector String:
CVSS:3.1/AV:L/AC:L/MR:L/UI:N/S:U/C:L/I:N/A:L
References
- https://nvd.nist.gov/vuln/detail/CVE-2025-22870
- https://go-review.googlesource.com/q/project:net
- https://go.dev/cl/654697
- https://go.dev/issue/71984
- https://pkg.go.dev/vuln/GO-2025-3503
- https://security.netapp.com/advisory/ntap-20250509-0007
- http://www.openwall.com/lists/oss-security/2025/03/07/2
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
golang.org/x/net vulnerable to Cross-site Scripting
CVE-2025-22872 / GHSA-vvgc-356p-c3xw / GO-2025-3595
More information
Details
The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).
Severity
- CVSS Score: Unknown
- Vector String:
CVSS:4.0/AV:N/AC:L/AT:N/MR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
References
- https://nvd.nist.gov/vuln/detail/CVE-2025-22872
- https://go.dev/cl/662715
- https://go.dev/issue/73070
- https://groups.google.com/g/golang-announce/c/ezSKR9vqbqA
- https://pkg.go.dev/vuln/GO-2025-3595
- https://security.netapp.com/advisory/ntap-20250516-0007
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Incorrect Neutralization of Input During Web Page Generation in x/net in golang.org/x/net
CVE-2025-22872 / GHSA-vvgc-356p-c3xw / GO-2025-3595
More information
Details
The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).
Severity
Unknown
References
- https://go.dev/cl/662715
- https://go.dev/issue/73070
- https://groups.google.com/g/golang-announce/c/ezSKR9vqbqA
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
Configuration
-
If you want to rebase/retry this MR, check this box
This MR has been generated by Renovate Bot.