Terraform Provider: Security vulnerabilities due to outdated Go version and dependencies #146

Closed
opened 2026-04-05 16:18:57 +02:00 by MrUnknownDE · 0 comments
Owner

Originally created by @listellm on 1/21/2026

Summary

The OneUptime Terraform provider (v9.4.2) contains 26 security vulnerabilities (4 HIGH, 22 MEDIUM) due to being built with an outdated Go version and dependencies.

Trivy Scan Results

terraform-provider-oneuptime_linux_amd64 (gobinary)
Total: 26 (UNKNOWN: 0, LOW: 0, MEDIUM: 22, HIGH: 4, CRITICAL: 0)

HIGH Severity (4)

Library CVE Installed Fixed
stdlib CVE-2024-34156 v1.21.13 1.22.7, 1.23.1
stdlib CVE-2025-47907 v1.21.13 1.23.12, 1.24.6
stdlib CVE-2025-58183 v1.21.13 1.24.8, 1.25.2
stdlib CVE-2025-61729 v1.21.13 1.24.11, 1.25.5

MEDIUM Severity (22)

Key affected dependencies:

  • Go stdlib v1.21.13 - Multiple CVEs affecting encoding/gob, go/parser, net/http, crypto/x509, etc.
  • golang.org/x/net v0.21.0 - CVE-2023-45288, CVE-2025-22870, CVE-2025-22872
  1. Update Go version to at least 1.24.x or latest stable
  2. Update golang.org/x/net to at least v0.38.0
  3. Run go mod tidy to update transitive dependencies

Environment

  • Provider version: 9.4.2
  • Source: registry.terraform.io/oneuptime/oneuptime
  • Scanned with: Trivy v0.68

Impact

These vulnerabilities could potentially be exploited in scenarios involving:

  • Malicious API responses (DoS via deeply nested structures)
  • HTTP request smuggling
  • Certificate validation bypass
  • Memory exhaustion attacks

While the provider typically runs in controlled environments, updating dependencies would improve the overall security posture.

*Originally created by @listellm on 1/21/2026* ## Summary The OneUptime Terraform provider (v9.4.2) contains 26 security vulnerabilities (4 HIGH, 22 MEDIUM) due to being built with an outdated Go version and dependencies. ## Trivy Scan Results ``` terraform-provider-oneuptime_linux_amd64 (gobinary) Total: 26 (UNKNOWN: 0, LOW: 0, MEDIUM: 22, HIGH: 4, CRITICAL: 0) ``` ### HIGH Severity (4) | Library | CVE | Installed | Fixed | |---------|-----|-----------|-------| | stdlib | CVE-2024-34156 | v1.21.13 | 1.22.7, 1.23.1 | | stdlib | CVE-2025-47907 | v1.21.13 | 1.23.12, 1.24.6 | | stdlib | CVE-2025-58183 | v1.21.13 | 1.24.8, 1.25.2 | | stdlib | CVE-2025-61729 | v1.21.13 | 1.24.11, 1.25.5 | ### MEDIUM Severity (22) Key affected dependencies: - **Go stdlib v1.21.13** - Multiple CVEs affecting encoding/gob, go/parser, net/http, crypto/x509, etc. - **golang.org/x/net v0.21.0** - CVE-2023-45288, CVE-2025-22870, CVE-2025-22872 ## Recommended Fix 1. **Update Go version** to at least 1.24.x or latest stable 2. **Update golang.org/x/net** to at least v0.38.0 3. **Run `go mod tidy`** to update transitive dependencies ## Environment - Provider version: 9.4.2 - Source: `registry.terraform.io/oneuptime/oneuptime` - Scanned with: Trivy v0.68 ## Impact These vulnerabilities could potentially be exploited in scenarios involving: - Malicious API responses (DoS via deeply nested structures) - HTTP request smuggling - Certificate validation bypass - Memory exhaustion attacks While the provider typically runs in controlled environments, updating dependencies would improve the overall security posture.
Sign in to join this conversation.
No Label
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: github/oneuptime#146