{"id":"GO-2024-2853","summary":"sshpiper's enabling of proxy protocol without proper feature flagging allows faking source address in github.com/tg123/sshpiper","details":"sshpiper's enabling of proxy protocol without proper feature flagging allows faking source address in github.com/tg123/sshpiper","aliases":["CVE-2024-35175","GHSA-4w53-6jvp-gg52"],"modified":"2026-03-03T04:55:22.341464Z","published":"2024-06-04T15:19:21Z","database_specific":{"review_status":"UNREVIEWED","url":"https://pkg.go.dev/vuln/GO-2024-2853"},"references":[{"type":"ADVISORY","url":"https://github.com/tg123/sshpiper/security/advisories/GHSA-4w53-6jvp-gg52"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35175"},{"type":"FIX","url":"https://github.com/tg123/sshpiper/commit/2ddd69876a1e1119059debc59fe869cb4e754430"},{"type":"FIX","url":"https://github.com/tg123/sshpiper/commit/70fb830dca26bea7ced772ce5d834a3e88ae7f53"}],"affected":[{"package":{"name":"github.com/tg123/sshpiper","ecosystem":"Go","purl":"pkg:golang/github.com/tg123/sshpiper"},"ranges":[{"type":"SEMVER","events":[{"introduced":"1.0.50"},{"fixed":"1.3.0"}]}],"ecosystem_specific":{},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2024-2853.json"}}],"schema_version":"1.7.3"}