Vulnerabilities > CVE-2020-26283 - Unspecified vulnerability in Protocol Go-Ipfs
Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
go-ipfs is an open-source golang implementation of IPFS which is a global, versioned, peer-to-peer filesystem. In go-ipfs before version 0.8.0, control characters are not escaped from console output. This can result in hiding input from the user which could result in the user taking an unknown, malicious action. This is fixed in version 0.8.0.
Vulnerable Configurations
References
- https://github.com/ipfs/go-ipfs/commit/fb0a9acd2d8288bd1028c3219a420de62a09683a
- https://github.com/ipfs/go-ipfs/commit/fb0a9acd2d8288bd1028c3219a420de62a09683a
- https://github.com/ipfs/go-ipfs/pull/7831
- https://github.com/ipfs/go-ipfs/pull/7831
- https://github.com/ipfs/go-ipfs/security/advisories/GHSA-r4gv-vj59-cccm
- https://github.com/ipfs/go-ipfs/security/advisories/GHSA-r4gv-vj59-cccm