Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
54 changes: 39 additions & 15 deletions go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -17,13 +17,15 @@ require (
github.com/operator-framework/api v0.17.1
github.com/operator-framework/operator-lifecycle-manager v0.22.0
github.com/pkg/errors v0.9.1
github.com/prometheus/client_golang v1.22.0
github.com/prometheus/client_model v0.6.1
github.com/prometheus/common v0.62.0
github.com/prometheus-community/prom-label-proxy v0.12.1
github.com/prometheus/client_golang v1.23.2
github.com/prometheus/client_model v0.6.2
github.com/prometheus/common v0.66.1
github.com/prometheus/prometheus v0.305.0
Comment on lines +20 to +24
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major

🧩 Analysis chain

🏁 Script executed:

#!/bin/bash
# First, locate and examine the go.mod file
find . -name "go.mod" -type f | head -20

Repository: openshift/cluster-version-operator

Length of output: 86


🏁 Script executed:

#!/bin/bash
# If go.mod exists at root, examine lines around 20-24
if [ -f "go.mod" ]; then
  echo "=== go.mod content (lines 15-30) ==="
  sed -n '15,30p' go.mod
  echo ""
  echo "=== Full module declaration ==="
  head -5 go.mod
fi

Repository: openshift/cluster-version-operator

Length of output: 885


🌐 Web query:

prom-label-proxy v0.12.1 security vulnerabilities CVE

💡 Result:

I couldn't find any CVE entries for prom-label-proxy v0.12.1. The project's GitHub/releases pages list the v0.12.x series but no security advisories or CVE IDs are published for that release. [1][2]

If you want, I can (a) monitor NVD/GHSA for new CVEs and alert you, or (b) run a focused dependency scan (SCA) against your image/artifacts to check for CVEs in dependencies. [1] https://github.com/prometheus-community/prom-label-proxy. [2] release listing / changelog for the project. [3] Snyk package page for related prom-label-proxy packages (no CVE for upstream prom-label-proxy v0.12.1 listed).


🌐 Web query:

prometheus client_golang v1.23.2 security vulnerabilities

💡 Result:

Short answer: There are no public CVEs that specifically affect prometheus/client_golang v1.23.2. Known serious client_golang vulnerabilities (e.g., CVE‑2022‑21698 / GO‑2022‑0322 — promhttp unbounded cardinality DoS) were fixed in much earlier releases (fixed in v1.11.1); v1.23.2 is a 2025 maintenance release with no functional/security changes listed. [1][2]

Sources:

  • client_golang v1.23.2 release notes (no security/fix entries). [1]
  • OSV / GO-2022-0322 (CVE-2022-21698) denial-of-service advisory affecting < v1.11.1. [2]

🌐 Web query:

prometheus v0.305.0 security vulnerabilities

💡 Result:

I found one confirmed public CVE that lists v0.305.0 as an affected Prometheus version:

  • CVE‑2019‑3826 — stored DOM cross‑site scripting (XSS) in Prometheus < 2.7.1 (listed as affecting v0.305.0 by several vulnerability trackers). [NVD][1], [OpenHub][2].

I did not find any separate/new high‑severity CVEs specifically introduced in the v0.305.0 release in the sources searched. For a complete, up‑to‑date inventory for your environment I recommend checking the NVD/MITRE entries and your distro/security advisories (they may map package builds to CVEs). Relevant sources: NVD CVE‑2019‑3826 and OpenHub version->vulnerability mapping. [1][2]

Sources

  1. NVD — CVE‑2019‑3826 (Prometheus XSS). [NVD entry]. [3].
  2. OpenHub — Prometheus vulnerabilities / versions (shows v0.305.0 linked to CVE‑2019‑3826). [4].

(If you want, I can run a deeper search across vendor advisories, GitHub issues, and distro trackers and return a full CVE list and mitigation steps.)


Investigate prometheus v0.305.0 — associated with CVE-2019-3826 (XSS vulnerability).

The addition of prom-label-proxy v0.12.1 appears secure with no known vulnerabilities, and prometheus/client_golang v1.23.2 is a recent 2025 release with no active CVEs.

However, prometheus v0.305.0 is flagged for CVE-2019-3826, a stored DOM cross-site scripting vulnerability affecting Prometheus versions below 2.7.1. The version number format (v0.305.0) is also unusual for modern Prometheus releases and should be verified — confirm whether this is the intended version or if it should be updated to a more recent release like v2.54.x or later.

🤖 Prompt for AI Agents
In @go.mod around lines 20 - 24, The go.mod entry
"github.com/prometheus/prometheus v0.305.0" is suspicious (unusual versioning)
and flagged by the reviewer for CVE-2019-3826; verify whether that is the
intended module/version and replace it with a supported, non-vulnerable
Prometheus release (e.g., update the require to a modern v2.54.x or later), then
run go get github.com/prometheus/prometheus@<desired-version> and go mod tidy to
update go.sum, followed by running your dependency vulnerability scanner and
project tests to confirm the upgrade did not break compatibility.

github.com/spf13/cobra v1.9.1
golang.org/x/crypto v0.42.0
golang.org/x/net v0.43.0
golang.org/x/time v0.9.0
golang.org/x/time v0.12.0
gopkg.in/fsnotify.v1 v1.4.7
k8s.io/api v0.34.1
k8s.io/apiextensions-apiserver v0.34.1
Expand All @@ -36,51 +38,73 @@ require (

require (
cel.dev/expr v0.24.0 // indirect
cloud.google.com/go/compute/metadata v0.9.0 // indirect
github.com/antlr4-go/antlr/v4 v4.13.0 // indirect
github.com/asaskevich/govalidator v0.0.0-20230301143203-a9d515a09cc2 // indirect
github.com/beorn7/perks v1.0.1 // indirect
github.com/cespare/xxhash/v2 v2.3.0 // indirect
github.com/dennwc/varint v1.0.0 // indirect
github.com/efficientgo/core v1.0.0-rc.3 // indirect
github.com/emicklei/go-restful/v3 v3.12.2 // indirect
github.com/fxamacker/cbor/v2 v2.9.0 // indirect
github.com/go-logr/stdr v1.2.2 // indirect
github.com/go-openapi/analysis v0.23.0 // indirect
github.com/go-openapi/errors v0.22.0 // indirect
github.com/go-openapi/jsonpointer v0.21.0 // indirect
github.com/go-openapi/jsonreference v0.20.2 // indirect
github.com/go-openapi/jsonreference v0.21.0 // indirect
github.com/go-openapi/loads v0.22.0 // indirect
github.com/go-openapi/runtime v0.28.0 // indirect
github.com/go-openapi/spec v0.21.0 // indirect
github.com/go-openapi/strfmt v0.23.0 // indirect
github.com/go-openapi/swag v0.23.0 // indirect
github.com/go-openapi/validate v0.24.0 // indirect
github.com/go-task/slim-sprig/v3 v3.0.0 // indirect
github.com/gogo/protobuf v1.3.2 // indirect
github.com/google/cel-go v0.26.0 // indirect
github.com/google/gnostic-models v0.7.0 // indirect
github.com/google/pprof v0.0.0-20241029153458-d1b30febd7db // indirect
github.com/google/pprof v0.0.0-20250607225305-033d6d78b36a // indirect
github.com/grafana/regexp v0.0.0-20240518133315-a468a5bfb3bc // indirect
github.com/inconshreveable/mousetrap v1.1.0 // indirect
github.com/josharian/intern v1.0.0 // indirect
github.com/jpillora/backoff v1.0.0 // indirect
github.com/json-iterator/go v1.1.12 // indirect
github.com/mailru/easyjson v0.7.7 // indirect
github.com/metalmatze/signal v0.0.0-20210307161603-1c9aa721a97a // indirect
github.com/mitchellh/mapstructure v1.5.0 // indirect
github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // indirect
github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee // indirect
github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 // indirect
github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f // indirect
github.com/oklog/ulid v1.3.1 // indirect
github.com/opentracing/opentracing-go v1.2.0 // indirect
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 // indirect
github.com/prometheus/procfs v0.15.1 // indirect
github.com/prometheus/alertmanager v0.28.1 // indirect
github.com/prometheus/procfs v0.16.1 // indirect
github.com/robfig/cron v1.2.0 // indirect
github.com/sirupsen/logrus v1.9.3 // indirect
github.com/spf13/pflag v1.0.6 // indirect
github.com/stoewer/go-strcase v1.3.0 // indirect
github.com/x448/float16 v0.8.4 // indirect
go.opentelemetry.io/otel v1.35.0 // indirect
go.opentelemetry.io/otel/trace v1.35.0 // indirect
go.mongodb.org/mongo-driver v1.14.0 // indirect
go.opentelemetry.io/auto/sdk v1.1.0 // indirect
go.opentelemetry.io/otel v1.36.0 // indirect
go.opentelemetry.io/otel/metric v1.36.0 // indirect
go.opentelemetry.io/otel/trace v1.36.0 // indirect
go.uber.org/atomic v1.11.0 // indirect
go.yaml.in/yaml/v2 v2.4.2 // indirect
go.yaml.in/yaml/v3 v3.0.4 // indirect
golang.org/x/exp v0.0.0-20240719175910-8a7402abbf56 // indirect
golang.org/x/oauth2 v0.27.0 // indirect
golang.org/x/exp v0.0.0-20250106191152-7588d65b2ba8 // indirect
golang.org/x/oauth2 v0.30.0 // indirect
golang.org/x/sync v0.17.0 // indirect
golang.org/x/sys v0.36.0 // indirect
golang.org/x/term v0.35.0 // indirect
golang.org/x/text v0.29.0 // indirect
golang.org/x/tools v0.36.0 // indirect
google.golang.org/genproto/googleapis/api v0.0.0-20250303144028-a0af3efb3deb // indirect
google.golang.org/genproto/googleapis/rpc v0.0.0-20250303144028-a0af3efb3deb // indirect
google.golang.org/protobuf v1.36.5 // indirect
google.golang.org/genproto/googleapis/api v0.0.0-20250603155806-513f23925822 // indirect
google.golang.org/genproto/googleapis/rpc v0.0.0-20250603155806-513f23925822 // indirect
google.golang.org/protobuf v1.36.8 // indirect
gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect
gopkg.in/inf.v0 v0.9.1 // indirect
gopkg.in/yaml.v2 v2.4.0 // indirect
gopkg.in/yaml.v3 v3.0.1 // indirect
k8s.io/apiserver v0.34.1 // indirect
k8s.io/component-base v0.34.1 // indirect
Expand Down
Loading