Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/patrickhener/goshs/v2
  4. ›
  5. GHSA-7qx6-f23w-3w7f

GHSA-7qx6-f23w-3w7f: Unauthenticated Open Redirect, Arbitrary HTTP Response Header Injection, Missing CSRF, and Invisible-Mode Bypass in goshs `/?redirect` endpoint

April 14, 2026

The GET /?redirect endpoint in goshs v2.0.0-beta.6 performs an HTTP redirect to any attacker-supplied url= value and writes any attacker-supplied header=Name: Value pair into the response, without scheme/host validation, without a header-name allow-list, without authentication in the default deployment, and without the checkCSRF() guard that GHSA-jrq5-hg6x-j6g3 added to the other state-changing GET routes (?mkdir, ?delete). The same dispatcher also lacks an fs.Invisible branch, so the endpoint stays responsive in -I stealth mode and reliably fingerprints an “invisible” goshs deployment with a single request.

References

  • github.com/advisories/GHSA-7qx6-f23w-3w7f
  • github.com/patrickhener/goshs
  • github.com/patrickhener/goshs/security/advisories/GHSA-7qx6-f23w-3w7f

Code Behaviors & Features

Detect and mitigate GHSA-7qx6-f23w-3w7f with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 2.0.0-beta.6

Solution

Unfortunately, there is no solution available yet.

Impact

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Source file

go/github.com/patrickhener/goshs/v2/GHSA-7qx6-f23w-3w7f.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:51 +0000.