CVE-2018-17143
Description
The html package (aka x/net/html) through 2018-09-17 in Go mishandles <isindex/action=0>, leading to a "panic: runtime error" in inBodyIM in parse.go during an html.Parse call.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The x/net/html package in Go panics on malformed HTML containing `<isindex/action=0>`, leading to a segmentation violation.
Vulnerability
The html package (x/net/html) in Go through 2018-09-17 mishandles a malformed HTML fragment containing <isindex/action=0> [1][2]. When the html.Parse function processes this sequence, the parser transitions between insertion modes (inTableBodyIM -> inTableIM -> inBodyIM) and attempts to dereference a nil pointer in inBodyIM at parse.go:988 [2]. Affected versions include Go 1.10.3 and earlier releases [2].
Exploitation
An attacker can trigger the panic by supplying the specific HTML string <isindex/action=0> to any application that calls html.Parse on user-controlled input [2]. No authentication or special privileges are required; only the ability to submit crafted HTML to the parser [2]. The attack is a simple client-side data injection, such as posting a comment or sending data to a server-side form that parses HTML.
Impact
Successful exploitation causes a runtime panic, resulting in a denial of service (DoS). The application crashes with a segmentation violation (SIGSEGV) [2]. This can be used to disrupt availability of services that rely on the x/net/html package for HTML parsing [1][2]. The panic does not allow arbitrary code execution or information disclosure.
Mitigation
A fix was included in the x/net repository after the issue was reported (GitHub issue 27704) [2]. Users should update to a version of golang.org/x/net/html that contains the patch. The Go vulnerability database entry (GO-2022-0193) lists the affected package [4]. No workaround is available for unpatched versions; applications must either upgrade the module or filter inputs to prevent <isindex/action=0> sequences from reaching html.Parse.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
golang.org/x/netGo | < 0.0.0-20180921000356-2f5d2388922f | 0.0.0-20180921000356-2f5d2388922f |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- github.com/advisories/GHSA-fcf9-6fv2-fc5vghsaADVISORY
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LREEWY6KNLHRWFZ7OT4HVLMVVCGGUHON/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UKRCI7WIOCOCD3H7NXWRGIRABTQOZOBK/mitrevendor-advisoryx_refsource_FEDORA
- nvd.nist.gov/vuln/detail/CVE-2018-17143ghsaADVISORY
- github.com/golang/go/issues/27704ghsax_refsource_MISCWEB
- go-review.googlesource.com/c/net/+/136575ghsax_refsource_CONFIRMWEB
- go.dev/issue/27704ghsaWEB
- go.googlesource.com/net/+/2f5d2388922f370f4355f327fcf4cfe9f5583908ghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LREEWY6KNLHRWFZ7OT4HVLMVVCGGUHONghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKRCI7WIOCOCD3H7NXWRGIRABTQOZOBKghsaWEB
- pkg.go.dev/vuln/GO-2022-0193ghsaWEB
News mentions
0No linked articles in our index yet.