-
CVSS Score
-The vulnerability stems from unsafe path construction in the locales/resources.json endpoint handler. While the exact commit diff isn't available, multiple advisories explicitly reference line 112 in pkg/plugins/handlers as the vulnerable location. In Go HTTP handlers, this would correspond to a method on a PluginHandler struct responsible for serving localization resources. The function would directly process user-controlled lng/ns parameters to build filesystem paths without adequate validation, making it appear in runtime profiles during exploitation attempts.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/openshift/console | go | <= 6.0.6 |
A Semantic Attack on Google Gemini - Read the Latest Research