Skip to content
This repository has been archived by the owner on Jan 2, 2025. It is now read-only.

Information disclosure vulnerability at /debug/vars #74

Open
alchemydc opened this issue Nov 30, 2023 · 0 comments
Open

Information disclosure vulnerability at /debug/vars #74

alchemydc opened this issue Nov 30, 2023 · 0 comments

Comments

@alchemydc
Copy link
Contributor

The /debug/vars endpoint exposed by the net/http/pprof package in Go provides a JSON output of the values of all expvar variables. These variables can include a variety of information about the internal state of your application, such as:

  • Command-line arguments with which the program was started
  • The number of garbage collections
  • The number of goroutines
  • Memory statistics
  • Information about the last garbage collection

While this information is not typically sensitive in the sense of revealing secrets or private data, it can provide a lot of information about the internal workings of your application. This could potentially be used by an attacker to understand more about your system and find ways to exploit it.

Therefore, it's generally a good idea to not expose this endpoint in a production environment, or at least restrict access to it.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant