CVE-2024-27302

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-27302
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27302.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-27302
Aliases
Related
Published
2024-03-06T19:15:08Z
Modified
2025-01-08T15:55:49.542680Z
Summary
[none]
Details

go-zero is a web and rpc framework. Go-zero allows user to specify a CORS Filter with a configurable allows param - which is an array of domains allowed in CORS policy. However, the isOriginAllowed uses strings.HasSuffix to check the origin, which leads to bypass via a malicious domain. This vulnerability is capable of breaking CORS policy and thus allowing any page to make requests and/or retrieve data on behalf of other users. Version 1.4.4 fixes this issue.

References

Affected packages

Git / github.com/zeromicro/go-zero

Affected ranges

Type
GIT
Repo
https://github.com/zeromicro/go-zero
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

tools/goctl/v1.*

tools/goctl/v1.2.4
tools/goctl/v1.2.5
tools/goctl/v1.3.0
tools/goctl/v1.3.0-alpha
tools/goctl/v1.3.0-beta1
tools/goctl/v1.3.1
tools/goctl/v1.3.1-alpha
tools/goctl/v1.3.2
tools/goctl/v1.3.3
tools/goctl/v1.3.4
tools/goctl/v1.3.5
tools/goctl/v1.3.6
tools/goctl/v1.3.7
tools/goctl/v1.3.8
tools/goctl/v1.3.9
tools/goctl/v1.4.0
tools/goctl/v1.4.1
tools/goctl/v1.4.2
tools/goctl/v1.4.3
tools/goctl/v1.4.4
tools/goctl/v1.5.0

v1.*

v1.0.0
v1.0.1
v1.0.10
v1.0.11
v1.0.12
v1.0.13
v1.0.14
v1.0.15
v1.0.16
v1.0.17
v1.0.18
v1.0.19
v1.0.2
v1.0.20
v1.0.21
v1.0.22
v1.0.23
v1.0.24
v1.0.25
v1.0.26
v1.0.27
v1.0.28
v1.0.29
v1.0.3
v1.0.4
v1.0.5
v1.0.6
v1.0.7
v1.0.8
v1.0.9
v1.1.0
v1.1.1
v1.1.10
v1.1.2
v1.1.3
v1.1.3-beta
v1.1.3-pre
v1.1.4
v1.1.5
v1.1.6
v1.1.7
v1.1.8
v1.1.9
v1.2.0
v1.2.1
v1.2.2
v1.2.3
v1.2.4
v1.2.5
v1.3.0
v1.3.0-alpha
v1.3.0-beta
v1.3.1
v1.3.2
v1.3.3
v1.3.4
v1.3.5
v1.4.0
v1.4.1
v1.4.2
v1.4.3
v1.4.4
v1.5.0