Vulnerability identifier: #VU97957
Vulnerability risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
CORS
Web applications /
Other software
Vendor: Gin-Gonic
Description
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to incorrect handling of the wildcard character in the URL within parseWildcardRules, which can lead to security restrictions bypass.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
CORS: 1.0 - 1.5.0
External links
http://github.com/gin-contrib/cors/pull/57
http://github.com/gin-contrib/cors/pull/106
http://github.com/gin-contrib/cors/compare/v1.5.0...v1.6.0
http://github.com/gin-contrib/cors/releases/tag/v1.6.0
http://github.com/gin-contrib/cors/commit/27b723a473efd80d5a498fa9f5933c80204c850d
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.