Skip to content

Commit 16b6632

Browse files
tatianabgopherbot
authored andcommitted
data/reports: add GO-2024-2883
- data/reports/GO-2024-2883.yaml Fixes #2883 Change-Id: I3ebb879ae003b99ae755f72909b583fbf7d4dbbf Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/595963 Auto-Submit: Tatiana Bradley <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]> Reviewed-by: Tim King <[email protected]>
1 parent c2781c4 commit 16b6632

File tree

2 files changed

+100
-0
lines changed

2 files changed

+100
-0
lines changed

data/osv/GO-2024-2883.json

Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2024-2883",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"summary": "Denial of service via malicious preflight requests in github.com/rs/cors",
7+
"details": "Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service.",
8+
"affected": [
9+
{
10+
"package": {
11+
"name": "github.com/rs/cors",
12+
"ecosystem": "Go"
13+
},
14+
"ranges": [
15+
{
16+
"type": "SEMVER",
17+
"events": [
18+
{
19+
"introduced": "1.9.0"
20+
},
21+
{
22+
"fixed": "1.11.0"
23+
}
24+
]
25+
}
26+
],
27+
"ecosystem_specific": {
28+
"imports": [
29+
{
30+
"path": "github.com/rs/cors",
31+
"symbols": [
32+
"AllowAll",
33+
"Cors.HandlerFunc",
34+
"Cors.ServeHTTP",
35+
"Cors.areHeadersAllowed",
36+
"Cors.handlePreflight",
37+
"Default",
38+
"New",
39+
"splitHeaderValues"
40+
]
41+
}
42+
]
43+
}
44+
}
45+
],
46+
"references": [
47+
{
48+
"type": "FIX",
49+
"url": "https://github.com/rs/cors/pull/171"
50+
},
51+
{
52+
"type": "REPORT",
53+
"url": "https://github.com/rs/cors/issues/170"
54+
}
55+
],
56+
"credits": [
57+
{
58+
"name": "@jub0bs"
59+
}
60+
],
61+
"database_specific": {
62+
"url": "https://pkg.go.dev/vuln/GO-2024-2883",
63+
"review_status": "REVIEWED"
64+
}
65+
}

data/reports/GO-2024-2883.yaml

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
id: GO-2024-2883
2+
modules:
3+
- module: github.com/rs/cors
4+
versions:
5+
- introduced: 1.9.0
6+
- fixed: 1.11.0
7+
vulnerable_at: 1.10.1
8+
packages:
9+
- package: github.com/rs/cors
10+
symbols:
11+
- Cors.handlePreflight
12+
- Cors.areHeadersAllowed
13+
- New
14+
- splitHeaderValues
15+
derived_symbols:
16+
- AllowAll
17+
- Cors.HandlerFunc
18+
- Cors.ServeHTTP
19+
- Default
20+
summary: Denial of service via malicious preflight requests in github.com/rs/cors
21+
description: |-
22+
Middleware causes a prohibitive amount of heap allocations when processing
23+
malicious preflight requests that include a Access-Control-Request-Headers
24+
(ACRH) header whose value contains many commas. This behavior can be abused by
25+
attackers to produce undue load on the middleware/server as an attempt to cause
26+
a denial of service.
27+
credits:
28+
- '@jub0bs'
29+
references:
30+
- fix: https://github.com/rs/cors/pull/171
31+
- report: https://github.com/rs/cors/issues/170
32+
source:
33+
id: go-security-team
34+
created: 2024-07-02T11:27:50.335482-04:00
35+
review_status: REVIEWED

0 commit comments

Comments
 (0)