cve/2024/CVE-2024-27302.md
2024-06-18 02:51:15 +02:00

18 lines
1.0 KiB
Markdown

### [CVE-2024-27302](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27302)
![](https://img.shields.io/static/v1?label=Product&message=go-zero&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.4.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key&color=brighgreen)
### Description
go-zero is a web and rpc framework. Go-zero allows user to specify a CORS Filter with a configurable allows param - which is an array of domains allowed in CORS policy. However, the `isOriginAllowed` uses `strings.HasSuffix` to check the origin, which leads to bypass via a malicious domain. This vulnerability is capable of breaking CORS policy and thus allowing any page to make requests and/or retrieve data on behalf of other users. Version 1.4.4 fixes this issue.
### POC
#### Reference
- https://github.com/zeromicro/go-zero/security/advisories/GHSA-fgxv-gw55-r5fq
#### Github
No PoCs found on GitHub currently.