Serilog (before v2.1.0) contains a Client IP Spoofing vulnerability, which allows attackers to falsify their IP addresses in log files by specifying an arbitrary IP as a value of X-Forwarded-For or Client-Ip headers while performing HTTP requests.
It is not possible to configure Serilog.Enrichers.ClientInfo to not trust the X-Forwarded-For header.
{
"severity": "MODERATE",
"github_reviewed": true,
"nvd_published_at": "2024-08-29T18:15:14Z",
"github_reviewed_at": "2024-08-29T21:07:16Z",
"cwe_ids": [
"CWE-348",
"CWE-79"
]
}