Access Restriction Bypass Affecting code.cloudfoundry.org/gorouter/proxy package, versions <0.175.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.15% (52nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access Restriction Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-CODECLOUDFOUNDRYORGGOROUTERPROXY-50075
  • published10 Jun 2018
  • disclosed27 Nov 2017
  • creditUnknown

Introduced: 27 Nov 2017

CVE-2018-1193  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade code.cloudfoundry.org/gorouter/proxy to version 0.175.0 or higher.

Overview

code.cloudfoundry.org/gorouter/proxy contains the source code for the Cloud Foundry L7 HTTP router.

Affected versions of the package are vulnerable to Access Restriction Bypass. It lacks sanitization for user-provided X-Forwarded-Proto headers. A remote user can set the X-Forwarded-Proto header in a request to potentially bypass an application requirement to only respond over secure connections.

CVSS Scores

version 3.1