Cookie Tossing Affecting github.com/gitpod-io/gitpod/components/ws-proxy/pkg/proxy package, versions <main-gha.27122


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.04% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMGITPODIOGITPODCOMPONENTSWSPROXYPKGPROXY-7452075
  • published18 Jul 2024
  • disclosed15 Jul 2024
  • creditElliot Ward (Snyk Security Research)

Introduced: 15 Jul 2024

CVE-2024-21583  (opens in a new tab)
CWE-15  (opens in a new tab)
First added by Snyk

How to fix?

Upgrade github.com/gitpod-io/gitpod/components/ws-proxy/pkg/proxy to version main-gha.27122 or higher.

Overview

Affected versions of this package are vulnerable to Cookie Tossing due to a missing __Host- prefix on the _gitpod_io_jwt2_ session cookie. This allows an adversary who controls a subdomain to set the value of the cookie on the Gitpod control plane, which can be assigned to an attacker’s own JWT so that specific actions taken by the victim (such as connecting a new Github organization) are actioned by the attackers session.

CVSS Scores

version 4.0
version 3.1