The Lab · 2026-03-25 15:27:34 · GitHub Issues
A critical vulnerability in the gRPC library, tracked as CVE-2026-33186, has prompted internal security reviews for projects like ArgoCD that expose gRPC endpoints. The vulnerability carries a high severity score, raising immediate concerns for deployments. However, a user's technical analysis indicates ArgoCD may not ...
The Lab · 2026-03-25 16:27:20 · GitHub Issues
A critical security vulnerability in the widely-used gRPC-Go library has been disclosed, exposing servers to potential authorization bypass. The flaw, tracked as CVE-2026-33186, stems from improper input validation of the HTTP/2 `:path` pseudo-header. This weakness allows attackers to potentially circumvent intended ac...
The Lab · 2026-03-25 19:27:30 · GitHub Issues
一个存在于 gRPC-Go 库中的关键安全漏洞(CVE-2026-33186)已被确认,该漏洞允许攻击者在特定条件下绕过服务的授权控制。该漏洞影响所有低于 v1.79.3 版本的 `google.golang.org/grpc` 库。其核心风险在于,攻击者可以通过发送畸形的 HTTP/2 请求,利用对 `:path` 伪标头验证不当的缺陷,使请求路径绕过基于路径的授权策略检查,但仍能被路由到预期的处理程序。
该漏洞的利用条件较为苛刻,需要同时满足多个前提:服务必须运行 gRPC-Go 服务器;使用了基于路径的授权机制(如 `google.golang.org/grpc/authz` 或自定义拦截器);授权策略中包含了针对规范路径(...
The Lab · 2026-03-26 01:27:32 · GitHub Issues
A critical security flaw in the core routing logic of Google's gRPC-Go library has been patched, exposing servers to potential authorization bypass. The vulnerability, tracked as CVE-2026-33186, stems from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was found to be overly permissiv...
The Lab · 2026-03-26 01:27:34 · GitHub Issues
A critical security vulnerability in the core routing logic of gRPC-Go has been patched, exposing servers to potential authorization bypass. The flaw, tracked as CVE-2026-33186, stems from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server's routing was found to be excessively permissive,...
The Lab · 2026-03-26 18:27:21 · GitHub Issues
A critical security vulnerability in the widely-used gRPC-Go library exposes servers to authorization bypass attacks. The flaw, tracked as CVE-2026-33186, stems from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server's routing logic was found to be dangerously lenient, incorrectly accepti...
The Lab · 2026-03-26 18:27:22 · GitHub Issues
一个关键的安全更新正在通过 GitHub 的自动化依赖管理工具 Renovate 推送到全球数千个 Go 语言项目中。此次更新针对的是谷歌维护的核心网络通信库 `google.golang.org/grpc`,旨在修复一个被标记为 CVE-2026-33186 的高危漏洞。该漏洞被归类为“授权绕过”,其根源在于“不当的输入验证”,这意味着攻击者可能通过构造恶意输入,绕过服务端的身份验证或授权检查,从而访问未授权的数据或功能。
此次更新将 gRPC 库的版本从 `v1.63.2` 直接跳升至 `v1.79.3`,跨度巨大,表明其中包含了大量累积的修复和改进,而安全修复是此次强制升级的核心驱动力。自动化工具 Renovate 生成的合...
The Lab · 2026-03-26 18:27:24 · GitHub Issues
谷歌 gRPC-Go 框架的核心服务器组件中发现一个高危授权绕过漏洞(CVE-2026-33186),源于对 HTTP/2 `:path` 伪头(pseudo-header)的输入验证不当。该漏洞允许攻击者通过构造特定的恶意请求路径,绕过服务端的路由逻辑,可能导致未授权的数据访问或服务调用。漏洞的根本原因在于 gRPC-Go 服务器的路由逻辑过于宽松,接受了不符合规范的 `:path` 头值。
此次安全更新通过自动化的依赖管理工具 Renovate 以拉取请求(PR)形式发布,将 `google.golang.org/grpc` 模块从存在漏洞的 v1.58.3 版本紧急升级至修复后的 v1.79.3 版本。更新跨度巨大,涉及多个...
The Lab · 2026-03-26 20:27:28 · GitHub Issues
A critical security vulnerability in the widely-used gRPC-Go library exposes servers to authorization bypass attacks. The flaw, tracked as CVE-2026-33186, stems from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server's routing logic was found to be dangerously lenient, incorrectly accepti...
The Lab · 2026-03-28 02:26:52 · GitHub Issues
A critical, reachable vulnerability has been confirmed in the OpenBao project's `release/2.5.x` branch. The security flaw, identified as GO-2026-4762, is an authorization bypass in the gRPC-Go library, stemming from a missing leading slash in the `:path` header. Govulncheck analysis confirms the vulnerability is not ju...
The Lab · 2026-03-28 02:26:53 · GitHub Issues
A critical, reachable security vulnerability has been identified in the OpenBao project's `release/2.4.x` branch, posing a direct risk of authorization bypass. The flaw, tracked as GO-2026-4762, resides in the gRPC-Go library and is triggered by a missing leading slash in the `:path` header. Govulncheck analysis confir...
The Lab · 2026-03-28 02:26:58 · GitHub Issues
A critical, reachable vulnerability has been confirmed in the core codebase of OpenBao's official plugin repository. The security flaw, identified as GO-2026-4762, is an authorization bypass within the gRPC-Go library, stemming from a missing leading slash in the HTTP/2 `:path` pseudo-header. Automated analysis by `gov...
The Lab · 2026-03-29 02:26:50 · GitHub Issues
A critical, reachable vulnerability has been confirmed in the OpenBao project's `release/2.5.x` branch. The security flaw, identified as GO-2026-4762, is an authorization bypass in the gRPC-Go library, stemming from a missing leading slash in the `:path` header. Govulncheck analysis confirms the vulnerability is not ju...
The Lab · 2026-03-29 02:26:52 · GitHub Issues
A critical, reachable security vulnerability has been identified in the `release/2.4.x` branch of the OpenBao project. The flaw, tracked as GO-2026-4762, is an authorization bypass in the gRPC-Go library, stemming from a missing leading slash in the `:path` header. Govulncheck analysis confirms the vulnerability is not...
The Lab · 2026-03-29 02:26:55 · GitHub Issues
A critical, reachable vulnerability has been confirmed in the main branch of the OpenBao plugins repository, exposing a potential authorization bypass in the core gRPC-Go library. The flaw, tracked as GO-2026-4762, stems from a missing leading slash in the `:path` header, which could allow unauthorized access to protec...
The Lab · 2026-03-30 02:26:59 · GitHub Issues
A critical, reachable vulnerability has been confirmed in the OpenBao project's `release/2.5.x` branch, posing a direct authorization bypass risk. The security flaw, tracked as GO-2026-4762, resides within the gRPC-Go library and is exploitable due to a missing leading slash in the `:path` header. Automated analysis by...
The Lab · 2026-03-30 02:27:00 · GitHub Issues
A critical, reachable security vulnerability has been identified in the `release/2.4.x` branch of the OpenBao project. The flaw, tracked as GO-2026-4762, is an authorization bypass within the gRPC-Go library, stemming from a missing leading slash in the `:path` header. Govulncheck analysis confirms the vulnerable code ...
The Lab · 2026-03-30 02:27:04 · GitHub Issues
A critical, reachable vulnerability has been confirmed in the main branch of the OpenBao plugins repository, exposing a potential authorization bypass in the core gRPC communication layer. The flaw, identified as GO-2026-4762, stems from a missing leading slash in the `:path` header within the `google.golang.org/grpc` ...
The Lab · 2026-03-30 20:27:34 · GitHub Issues
A critical security flaw in the core routing logic of gRPC-Go servers has been disclosed, enabling potential authorization bypass. The vulnerability, tracked as CVE-2026-33186, stems from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server's routing was found to be excessively permissive, ...
The Lab · 2026-03-31 09:27:06 · GitHub Issues
A critical security vulnerability in the widely-used gRPC-Go library exposes servers to authorization bypass attacks. The flaw, tracked as CVE-2026-33186, stems from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server's routing logic was found to be excessively lenient, incorrectly accepti...