CVE-2022-31259

The route lookup process in beego before 1.12.9 and 2.x before 2.0.3 allows attackers to bypass access control. When a /p1/p2/:name route is configured, attackers can access it by appending .xml in various places (e.g., p1.xml instead of p1).
References
Link Resource
https://beego.vip Product
https://github.com/advisories/GHSA-qx32-f6g6-fcfr
https://github.com/beego/beego/issues/4946 Exploit Issue Tracking Patch Third Party Advisory
https://github.com/beego/beego/tree/v2.0.2 Release Notes Third Party Advisory
https://beego.vip Product
https://github.com/advisories/GHSA-qx32-f6g6-fcfr
https://github.com/beego/beego/issues/4946 Exploit Issue Tracking Patch Third Party Advisory
https://github.com/beego/beego/tree/v2.0.2 Release Notes Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:beego:beego:*:*:*:*:*:*:*:*
cpe:2.3:a:beego:beego:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:04

Type Values Removed Values Added
References () https://beego.vip - Product () https://beego.vip - Product
References () https://github.com/advisories/GHSA-qx32-f6g6-fcfr - () https://github.com/advisories/GHSA-qx32-f6g6-fcfr -
References () https://github.com/beego/beego/issues/4946 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://github.com/beego/beego/issues/4946 - Exploit, Issue Tracking, Patch, Third Party Advisory
References () https://github.com/beego/beego/tree/v2.0.2 - Release Notes, Third Party Advisory () https://github.com/beego/beego/tree/v2.0.2 - Release Notes, Third Party Advisory

Information

Published : 2022-05-21 19:15

Updated : 2024-11-21 07:04


NVD link : CVE-2022-31259

Mitre link : CVE-2022-31259

CVE.ORG link : CVE-2022-31259


JSON object : View

Products Affected

beego

  • beego