GHSA-v84h-653v-4pq9

Suggest an improvement
Source
https://github.com/advisories/GHSA-v84h-653v-4pq9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-v84h-653v-4pq9/GHSA-v84h-653v-4pq9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-v84h-653v-4pq9
Aliases
Related
Published
2024-05-03T17:34:21Z
Modified
2024-05-21T15:39:20Z
Severity
  • 9.3 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N CVSS Calculator
Summary
Some CORS middleware allow untrusted origins
Details

Impact

Some CORS middleware (more specifically those created by specifying two or more origin patterns whose hosts share a proper suffix) incorrectly allow some untrusted origins, thereby opening the door to cross-origin attacks from the untrusted origins in question.

For example, specifying origin patterns https://foo.com and https://bar.com (in that order) would yield a middleware that would incorrectly allow untrusted origin https://barfoo.com.

Patches

Patched in v0.9.0.

Workarounds

None.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2024-05-03T17:34:21Z"
}
References

Affected packages

Go / github.com/jub0bs/fcors

Package

Name
github.com/jub0bs/fcors
View open source insights on deps.dev
Purl
pkg:golang/github.com/jub0bs/fcors

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.0

Database specific

{
    "last_known_affected_version_range": "<= 0.8.0"
}