Access Restriction Bypass

Affecting code.cloudfoundry.org/gorouter/proxy package, versions <0.175.0

Do your applications use this vulnerable package? Test your applications

Overview

code.cloudfoundry.org/gorouter/proxy contains the source code for the Cloud Foundry L7 HTTP router.

Affected versions of the package are vulnerable to Access Restriction Bypass. It lacks sanitization for user-provided X-Forwarded-Proto headers. A remote user can set the X-Forwarded-Proto header in a request to potentially bypass an application requirement to only respond over secure connections.

Remediation

Upgrade code.cloudfoundry.org/gorouter/proxy to version 0.175.0 or higher.

References

CVSS Score

5.3
medium severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    Low
  • Integrity
    None
  • Availability
    None
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Credit
Unknown
CVE
CVE-2018-1193
CWE
CWE-284
Snyk ID
SNYK-GOLANG-CODECLOUDFOUNDRYORGGOROUTERPROXY-50075
Disclosed
27 Nov, 2017
Published
10 Jun, 2018