Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x/vulndb: potential Go vuln in github.com/rs/cors: GHSA-mh55-gqvf-xfwm #2975

Closed
GoVulnBot opened this issue Jul 5, 2024 · 2 comments
Closed

Comments

@GoVulnBot
Copy link

Advisory GHSA-mh55-gqvf-xfwm references a vulnerability in the following Go modules:

Module
github.com/rs/cors

Description:
Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service.

References:

Cross references:

See doc/triage.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/rs/cors
      versions:
        - introduced: 1.9.0
        - fixed: 1.11.0
      vulnerable_at: 1.10.1
summary: Denial of service via malicious preflight requests in github.com/rs/cors
ghsas:
    - GHSA-mh55-gqvf-xfwm
references:
    - advisory: https://github.com/advisories/GHSA-mh55-gqvf-xfwm
    - fix: https://github.com/rs/cors/commit/4c32059b2756926619f6bf70281b91be7b5dddb2
    - fix: https://github.com/rs/cors/pull/171
    - report: https://github.com/rs/cors/issues/170
source:
    id: GHSA-mh55-gqvf-xfwm
    created: 2024-07-05T20:01:12.658329941Z
review_status: UNREVIEWED

@tatianab
Copy link
Contributor

tatianab commented Jul 8, 2024

GHSA for #2883

@tatianab tatianab self-assigned this Jul 8, 2024
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/597156 mentions this issue: data/reports: update 2 reports

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants