Логотип exploitDog
bind:CVE-2023-28109
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-28109

Количество 2

Количество 2

nvd логотип

CVE-2023-28109

почти 3 года назад

Play With Docker is a browser-based Docker playground. Versions 0.0.2 and prior are vulnerable to domain hijacking. Because CORS configuration was not correct, an attacker could use `play-with-docker.com` as an example and set the origin header in an http request as `evil-play-with-docker.com`. The domain would echo in response header, which successfully bypassed the CORS policy and retrieved basic user information. This issue has been fixed in commit ed82247c9ab7990ad76ec2bf1498c2b2830b6f1a. There are no known workarounds.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-vq59-5x26-h639

почти 3 года назад

Authorization Bypass Through User-Controlled Key play-with-docker

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-28109

Play With Docker is a browser-based Docker playground. Versions 0.0.2 and prior are vulnerable to domain hijacking. Because CORS configuration was not correct, an attacker could use `play-with-docker.com` as an example and set the origin header in an http request as `evil-play-with-docker.com`. The domain would echo in response header, which successfully bypassed the CORS policy and retrieved basic user information. This issue has been fixed in commit ed82247c9ab7990ad76ec2bf1498c2b2830b6f1a. There are no known workarounds.

CVSS3: 6.5
0%
Низкий
почти 3 года назад
github логотип
GHSA-vq59-5x26-h639

Authorization Bypass Through User-Controlled Key play-with-docker

CVSS3: 6.5
0%
Низкий
почти 3 года назад

Уязвимостей на страницу