Опубликовано: 29 авг. 2024
Источник: github
Github: Прошло ревью
CVSS4: 6.9
CVSS3: 6.5
Описание
Serilog Client IP Spoofing vulnerability
Serilog (before v2.1.0) contains a Client IP Spoofing vulnerability, which allows attackers to falsify their IP addresses in log files by specifying an arbitrary IP as a value of X-Forwarded-For or Client-Ip headers while performing HTTP requests.
It is not possible to configure Serilog.Enrichers.ClientInfo to not trust the X-Forwarded-For header.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2024-44930
- https://github.com/serilog-contrib/serilog-enrichers-clientinfo/issues/29
- https://github.com/serilog-contrib/serilog-enrichers-clientinfo/pull/38
- https://github.com/serilog-contrib/serilog-enrichers-clientinfo/commit/a72051d1900131e6fb30bcfd9491a988167fb6ac
- https://github.com/serilog-contrib/serilog-enrichers-clientinfo/releases/tag/v2.1.0
Пакеты
Наименование
Serilog.Enrichers.ClientInfo
nuget
Затронутые версииВерсия исправления
< 2.1.0
2.1.0
EPSS
Процентиль: 66%
0.00516
Низкий
6.9 Medium
CVSS4
6.5 Medium
CVSS3
CVE ID
Дефекты
CWE-348
CWE-79
Связанные уязвимости
CVSS3: 6.5
nvd
больше 1 года назад
Serilog before v2.1.0 was discovered to contain a Client IP Spoofing vulnerability, which allows attackers to falsify their IP addresses by specifying an arbitrary IP as a value of X-Forwarded-For or Client-Ip headers while performing HTTP requests.
EPSS
Процентиль: 66%
0.00516
Низкий
6.9 Medium
CVSS4
6.5 Medium
CVSS3
CVE ID
Дефекты
CWE-348
CWE-79