First published: Mon Jun 06 2022(Updated: )
A flaw was found in CORS Filter feature from the go-restful package. When a user inputs a domain which is in AllowedDomains, all domains starting with the same pattern are accepted. This issue could allow an attacker to break the CORS policy by allowing any page to make requests and retrieve data on behalf of users.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openshift-serverless-clients | <0:1.3.1-4.el8 | 0:1.3.1-4.el8 |
redhat/openshift-gitops-kam | <0:1.8.3-6.el8 | 0:1.8.3-6.el8 |
redhat/openshift-gitops-kam | <0:1.9.0-102.el8 | 0:1.9.0-102.el8 |
redhat/go-restful | <3.8.0 | 3.8.0 |
IBM Db2 Warehouse | <=v3.5 through refresh 10v4.0 through refresh 9v4.5 through refresh 3v4.6 through refresh 6v4.7 through refresh 4v4.8 through refresh 4 | |
go-restful | <2.16.0 | |
go-restful | >=3.0.0<3.8.0 | |
Red Hat Fedora | =35 | |
Red Hat Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-1996 has been classified with a medium severity level due to its potential impact on CORS policy enforcement.
To remediate CVE-2022-1996, upgrade the go-restful package to version 3.8.0 or later.
CVE-2022-1996 affects the go-restful package and specific versions of openshift-serverless-clients and openshift-gitops-kam.
Yes, CVE-2022-1996 can allow attackers to bypass CORS policy, enabling malicious actions on behalf of users.
There are no reported workarounds for CVE-2022-1996; the recommended action is to apply the latest patch.