{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T13:53:11.834","vulnerabilities":[{"cve":{"id":"CVE-2023-45286","sourceIdentifier":"security@golang.org","published":"2023-11-28T17:15:08.280","lastModified":"2024-11-21T08:26:42.103","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body."},{"lang":"es","value":"Una condición de ejecución en go-resty puede dar como resultado la divulgación del cuerpo de la solicitud HTTP entre solicitudes. Esta condición se puede desencadenar llamando a sync.Pool.Put con el mismo *bytes.Buffer más de una vez, cuando los reintentos de solicitud están habilitados y se produce un reintento. La llamada a sync.Pool.Get devolverá un bytes.Buffer al que no se le ha llamado bytes.Buffer.Reset. Este búfer sucio contendrá el cuerpo de la solicitud HTTP de una solicitud no relacionada, y go-resty le agregará el cuerpo de la solicitud HTTP actual, enviando dos cuerpos en una solicitud. El sync.Pool en cuestión se define a nivel de paquete, por lo que un servidor completamente ajeno podría recibir el cuerpo de la solicitud."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-362"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:resty_project:resty:*:*:*:*:*:go:*:*","versionEndIncluding":"2.10.0","matchCriteriaId":"433974E8-CB64-4BBB-BB5A-9F072275B86F"}]}]}],"references":[{"url":"https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e","source":"security@golang.org"},{"url":"https://github.com/go-resty/resty/issues/739","source":"security@golang.org","tags":["Exploit","Issue Tracking"]},{"url":"https://github.com/go-resty/resty/issues/743","source":"security@golang.org","tags":["Issue Tracking"]},{"url":"https://github.com/go-resty/resty/pull/745","source":"security@golang.org","tags":["Issue Tracking","Patch"]},{"url":"https://pkg.go.dev/vuln/GO-2023-2328","source":"security@golang.org","tags":["Vendor Advisory"]},{"url":"https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/go-resty/resty/issues/739","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Issue Tracking"]},{"url":"https://github.com/go-resty/resty/issues/743","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking"]},{"url":"https://github.com/go-resty/resty/pull/745","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch"]},{"url":"https://pkg.go.dev/vuln/GO-2023-2328","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}