First published: Mon Jun 06 2022(Updated: )
A flaw was found in CORS Filter feature from the go-restful package. When a user inputs a domain which is in AllowedDomains, all domains starting with the same pattern are accepted. This issue could allow an attacker to break the CORS policy by allowing any page to make requests and retrieve data on behalf of users.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:1.3.1-4.el8 | 0:1.3.1-4.el8 |
redhat/openshift-gitops-kam | <0:1.8.3-6.el8 | 0:1.8.3-6.el8 |
redhat/openshift-gitops-kam | <0:1.9.0-102.el8 | 0:1.9.0-102.el8 |
Go-restful Project Go-restful | <2.16.0 | |
Go-restful Project Go-restful | >=3.0.0<3.8.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
redhat/go-restful | <3.8.0 | 3.8.0 |
IBM IBM® Db2® on Cloud Pak for Data and Db2 Warehouse on Cloud Pak for Data | <=v3.5 through refresh 10v4.0 through refresh 9v4.5 through refresh 3v4.6 through refresh 6v4.7 through refresh 4v4.8 through refresh 4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)