Usage of the CORS handler may apply improper CORS headers, allowing the requester to explicitly control the value of the Access-Control-Allow-Origin header, which bypasses the expected behavior of the Same Origin Policy.
References
Link | Resource |
---|---|
https://github.com/gorilla/handlers/commit/90663712d74cb411cbef281bc1e08c19d1a76145 | Patch Third Party Advisory |
https://github.com/gorilla/handlers/pull/116 | Patch Third Party Advisory |
https://pkg.go.dev/vuln/GO-2020-0020 | Third Party Advisory |
https://github.com/gorilla/handlers/commit/90663712d74cb411cbef281bc1e08c19d1a76145 | Patch Third Party Advisory |
https://github.com/gorilla/handlers/pull/116 | Patch Third Party Advisory |
https://pkg.go.dev/vuln/GO-2020-0020 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/gorilla/handlers/commit/90663712d74cb411cbef281bc1e08c19d1a76145 - Patch, Third Party Advisory | |
References | () https://github.com/gorilla/handlers/pull/116 - Patch, Third Party Advisory | |
References | () https://pkg.go.dev/vuln/GO-2020-0020 - Third Party Advisory |
Information
Published : 2022-12-27 22:15
Updated : 2024-11-21 03:22
NVD link : CVE-2017-20146
Mitre link : CVE-2017-20146
CVE.ORG link : CVE-2017-20146
JSON object : View
Products Affected
gorillatoolkit
- handlers
CWE
CWE-346
Origin Validation Error