漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Lego does not enforce HTTPS
Vulnerability Description
Let's Encrypt client and ACME library written in Go (Lego). In versions 4.25.1 and below, the github.com/go-acme/lego/v4/acme/api package (thus the lego library and the lego cli as well) don't enforce HTTPS when talking to CAs as an ACME client. Unlike the http-01 challenge which solves an ACME challenge over unencrypted HTTP, the ACME protocol requires HTTPS when a client communicates with the CA to performs ACME functions. However, the library fails to enforce HTTPS both in the original discover URL (configured by the library user) and in the subsequent addresses returned by the CAs in the directory and order objects. If users input HTTP URLs or CAs misconfigure endpoints, protocol operations occur over HTTP instead of HTTPS. This compromises privacy by exposing request/response details like account and request identifiers to network attackers. This was fixed in version 4.25.2.
CVSS Information
N/A
Vulnerability Type
敏感数据的明文传输
Vulnerability Title
Lego 安全漏洞
Vulnerability Description
Lego是go-acme开源的一个用Go编写的库。 Lego 4.25.1及之前版本存在安全漏洞,该漏洞源于未强制使用HTTPS与CA通信,可能泄露敏感信息。
CVSS Information
N/A
Vulnerability Type
N/A