Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Authorization Bypass vulnerabilities in an interactive lesson.
Start learningUpgrade github.com/emicklei/go-restful
to version 2.16.0 or higher.
Affected versions of this package are vulnerable to Authorization Bypass when using CORS
Filter with a configurable AllowedDomains
parameter (which is an array of domains allowed in CORS policy), with the same value as exists in allowedOriginPatterns
parameter (used for matching origin using regular expression), it causes for all domains in AllowedDomains
to be also used as regular expression for matching origin validation.
This behavior means that if example.com
exists in AllowedDomains
, all domains starting with example.com
would be acceptable, including example.com.hacker.domain
.