### [CVE-2024-27302](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27302) ![](https://img.shields.io/static/v1?label=Product&message=go-zero&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.4.4%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key&color=brighgreen) ### Description go-zero is a web and rpc framework. Go-zero allows user to specify a CORS Filter with a configurable allows param - which is an array of domains allowed in CORS policy. However, the `isOriginAllowed` uses `strings.HasSuffix` to check the origin, which leads to bypass via a malicious domain. This vulnerability is capable of breaking CORS policy and thus allowing any page to make requests and/or retrieve data on behalf of other users. Version 1.4.4 fixes this issue. ### POC #### Reference - https://github.com/zeromicro/go-zero/security/advisories/GHSA-fgxv-gw55-r5fq #### Github No PoCs found on GitHub currently.