Vulnerability Report: GO-2022-0619
- CVE-2022-1996, GHSA-r48q-9g5r-8q2h
- Affects: github.com/emicklei/go-restful, github.com/emicklei/go-restful/v2, and 1 more
- Published: Aug 15, 2022
- Modified: May 20, 2024
CORS filters that use an AllowedDomains configuration parameter can match domains outside the specified set, permitting an attacker to avoid the CORS policy. The AllowedDomains configuration parameter is documented as a list of allowed origin domains, but values in this list are applied as regular expression matches. For example, an allowed domain of "example.com" will match the Origin header "example.com.malicious.domain".
Affected Packages
-
PathGo VersionsSymbols
-
before v2.16.0+incompatible
-
all versions, no known fixed
-
from v3.0.0 before v3.8.0
Aliases
References
- https://github.com/emicklei/go-restful/commit/f292efff46ae17e9d104f865a60a39a2ae9402f1
- https://github.com/emicklei/go-restful/issues/489
- https://vuln.go.dev/ID/GO-2022-0619.json
Feedback
See anything missing or incorrect?
Suggest an edit to this report.