Skip to content

mastercactapus proxyprotocol vulnerable to denial of service

High severity GitHub Reviewed Published May 24, 2022 to the GitHub Advisory Database • Updated Aug 25, 2023

Package

gomod github.com/mastercactapus/proxyprotocol (Go)

Affected versions

< 0.0.2

Patched versions

0.0.2

Description

headerv2.go in mastercactapus proxyprotocol before 0.0.2, as used in the mastercactapus caddy-proxyprotocol plugin through 0.0.2 for Caddy, allows remote attackers to cause a denial of service (webserver panic and daemon crash) via a crafted HAProxy PROXY v2 request with truncated source/destination address data.

References

Published by the National Vulnerability Database Jul 23, 2019
Published to the GitHub Advisory Database May 24, 2022
Reviewed Jul 14, 2023
Last updated Aug 25, 2023

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Weaknesses

CVE ID

CVE-2019-14243

GHSA ID

GHSA-85c5-ccm8-vr96
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.