The Olivier Poitrey Go CORS handler through 1.3.0 actively converts a wildcard CORS policy into reflecting an arbitrary Origin header value, which is incompatible with the CORS security design, and could lead to CORS misconfiguration security problems.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106834 | Third Party Advisory |
https://github.com/rs/cors/issues/55 | Issue Tracking Third Party Advisory |
https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-chen.pdf | Third Party Advisory |
http://www.securityfocus.com/bid/106834 | Third Party Advisory |
https://github.com/rs/cors/issues/55 | Issue Tracking Third Party Advisory |
https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-chen.pdf | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/106834 - Third Party Advisory | |
References | () https://github.com/rs/cors/issues/55 - Issue Tracking, Third Party Advisory | |
References | () https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-chen.pdf - Third Party Advisory |
Information
Published : 2019-01-28 08:29
Updated : 2024-11-21 04:02
NVD link : CVE-2018-20744
Mitre link : CVE-2018-20744
CVE.ORG link : CVE-2018-20744
JSON object : View
Products Affected
go_cors_project
- go_cors
CWE
CWE-346
Origin Validation Error