Skip to content

Some CORS middleware allow untrusted origins

Critical severity GitHub Reviewed Published May 2, 2024 in jub0bs/fcors • Updated May 21, 2024

Package

gomod github.com/jub0bs/fcors (Go)

Affected versions

<= 0.8.0

Patched versions

0.9.0

Description

Impact

Some CORS middleware (more specifically those created by specifying two or more origin patterns whose hosts share a proper suffix) incorrectly allow some untrusted origins, thereby opening the door to cross-origin attacks from the untrusted origins in question.

For example, specifying origin patterns https://foo.com and https://bar.com (in that order) would yield a middleware that would incorrectly allow untrusted origin https://barfoo.com.

Patches

Patched in v0.9.0.

Workarounds

None.

References

@jub0bs jub0bs published to jub0bs/fcors May 2, 2024
Published to the GitHub Advisory Database May 3, 2024
Reviewed May 3, 2024
Last updated May 21, 2024

Severity

Critical
9.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

Weaknesses

No CWEs

CVE ID

No known CVE

GHSA ID

GHSA-v84h-653v-4pq9

Source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.