Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-47910

Опубликовано: 22 сент. 2025
Источник: redhat
CVSS3: 5.4
EPSS Низкий

Описание

When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.

A CrossOriginProtection bypass has been discovered in the golang net/http package. When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Assisted Installer for Red Hat OpenShift Container Platform 2rhai/assisted-installer-rhel9Under investigation
Builds for Red Hat OpenShiftopenshift-builds/openshift-builds-waiters-rhel9Under investigation
cert-manager Operator for Red Hat OpenShiftcert-manager/jetstack-cert-manager-rhel9Under investigation
Compliance Operatorcompliance/openshift-compliance-operator-bundleUnder investigation
Confidential Compute Attestationbuild-of-trustee/trustee-rhel9-operatorUnder investigation
Confidential Compute Attestationopenshift-sandboxed-containers/osc-monitor-rhel9Under investigation
Cryostat 4cryostat/cryostat-storage-rhel9Under investigation
Custom Metric Autoscaler operator for Red Hat Openshiftcustom-metrics-autoscaler/custom-metrics-autoscaler-rhel9Under investigation
Deployment Validation Operatordvo/deployment-validation-rhel8-operatorUnder investigation
ExternalDNS Operatoredo/external-dns-rhel8Under investigation

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-440
https://bugzilla.redhat.com/show_bug.cgi?id=2397528net/http: CrossOriginProtection bypass in net/http

EPSS

Процентиль: 1%
0.00011
Низкий

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.4
ubuntu
6 месяцев назад

When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.

CVSS3: 5.4
nvd
6 месяцев назад

When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.

CVSS3: 5.4
debian
6 месяцев назад

When using http.CrossOriginProtection, the AddInsecureBypassPattern me ...

suse-cvrf
6 месяцев назад

Security update for go1.25-openssl

suse-cvrf
6 месяцев назад

Security update for go1.25-openssl

EPSS

Процентиль: 1%
0.00011
Низкий

5.4 Medium

CVSS3