Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wvp2-9ppw-337j

Опубликовано: 25 июл. 2023
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Paths contain matrix variables bypass decorators

Impact

Spring supports Matrix variables. When Spring integration is used, Armeria calls Spring controllers via TomcatService or JettyService with the path that may contain matrix variables. In this situation, the Armeria decorators might not invoked because of the matrix variables. Let's see the following example:

// Spring controller @GetMapping("/important/resources") public String important() {...} // Armeria decorator ServerBuilder sb = ... sb.decoratorUnder("/important/", authService);

If an attacker sends a request with /important;a=b/resources, the request would bypass the authrorizer

Patches

Workarounds

Users can add decorators using regex. e.g. "regex:^/important.*"

Пакеты

Наименование

com.linecorp.armeria:armeria

maven
Затронутые версииВерсия исправления

<= 1.24.2

1.24.3

EPSS

Процентиль: 39%
0.00169
Низкий

7.5 High

CVSS3

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 7.5
nvd
больше 2 лет назад

Armeria is a microservice framework Spring supports Matrix variables. When Spring integration is used, Armeria calls Spring controllers via `TomcatService` or `JettyService` with the path that may contain matrix variables. Prior to version 1.24.3, the Armeria decorators might not invoked because of the matrix variables. If an attacker sends a specially crafted request, the request may bypass the authorizer. Version 1.24.3 contains a patch for this issue.

EPSS

Процентиль: 39%
0.00169
Низкий

7.5 High

CVSS3

Дефекты

CWE-863