Description
A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.
Published: 2023-11-28
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xwh9-gc39-5298 github.com/go-resty/resty/v2 HTTP request body disclosure
History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00221}

epss

{'score': 0.00169}


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00436}

epss

{'score': 0.00221}


Subscriptions

Redhat Migration Toolkit Applications Openshift Distributed Tracing
Resty Project Resty
cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2024-08-28T20:01:23.626Z

Reserved: 2023-10-06T17:06:26.221Z

Link: CVE-2023-45286

cve-icon Vulnrichment

Updated: 2024-08-02T20:21:15.309Z

cve-icon NVD

Status : Modified

Published: 2023-11-28T17:15:08.280

Modified: 2024-11-21T08:26:42.103

Link: CVE-2023-45286

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-11-28T00:00:00Z

Links: CVE-2023-45286 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses