Описание
go-zero is a web and rpc framework. Go-zero allows user to specify a CORS Filter with a configurable allows param - which is an array of domains allowed in CORS policy. However, the isOriginAllowed uses strings.HasSuffix to check the origin, which leads to bypass via a malicious domain. This vulnerability is capable of breaking CORS policy and thus allowing any page to make requests and/or retrieve data on behalf of other users. Version 1.4.4 fixes this issue.
Ссылки
- Patch
- ExploitVendor Advisory
- Patch
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.4.4 (исключая)
cpe:2.3:a:go-zero:go-zero:*:*:*:*:*:*:*:*
EPSS
Процентиль: 48%
0.00247
Низкий
9.1 Critical
CVSS3
Дефекты
CWE-639
Связанные уязвимости
CVSS3: 9.1
github
почти 2 года назад
Authorization Bypass Through User-Controlled Key in go-zero
EPSS
Процентиль: 48%
0.00247
Низкий
9.1 Critical
CVSS3
Дефекты
CWE-639