First published: Sun Dec 10 2023(Updated: )
The caddy-geo-ip (aka GeoIP) middleware through 0.6.0 for Caddy 2, when trust_header X-Forwarded-For is used, allows attackers to spoof their source IP address via an X-Forwarded-For header, which may bypass a protection mechanism (trusted_proxy directive in reverse_proxy or IP address range restrictions).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/shift72/caddy-geo-ip | <=0.6.0 | |
Caddy | <=0.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50463 has a high severity as it allows IP address spoofing, potentially bypassing access controls.
To fix CVE-2023-50463, upgrade the caddy-geo-ip middleware to version 0.6.1 or later.
CVE-2023-50463 affects the caddy-geo-ip middleware up to version 0.6.0 and Caddy versions up to 2.0.
CVE-2023-50463 facilitates attacks that involve spoofing the source IP address using the X-Forwarded-For header.
CVE-2023-50463 poses significant implications for network security as it can allow unauthorized access and impact trust in traffic originating from reverse proxies.