{"id":"CVE-2024-24785","details":"If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.","aliases":["BIT-golang-2024-24785","GO-2024-2610"],"modified":"2026-04-10T05:09:53.385793Z","published":"2024-03-05T23:15:07Z","related":["ALSA-2024:2562","ALSA-2024:3259","ALSA-2024:9135","ALSA-2026:3428","CGA-gx7j-g27r-6grj","RLSA-2024:2562","RLSA-2024:3259","SUSE-SU-2024:0800-1","SUSE-SU-2024:0811-1","SUSE-SU-2024:0812-1","SUSE-SU-2024:0936-1","SUSE-SU-2024:3089-1","SUSE-SU-2024:3755-1","SUSE-SU-2024:3772-1","SUSE-SU-2024:3938-1","openSUSE-SU-2024:13752-1","openSUSE-SU-2024:13756-1"],"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240329-0008/"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/03/08/4"},{"type":"WEB","url":"https://go.dev/cl/564196"},{"type":"WEB","url":"https://go.dev/issue/65697"},{"type":"WEB","url":"https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg"},{"type":"WEB","url":"https://pkg.go.dev/vuln/GO-2024-2610"}],"schema_version":"1.7.5"}