go-zero is a web and rpc framework. Go-zero allows user to specify a CORS Filter with a configurable allows param - which is an array of domains allowed in CORS policy. However, the `isOriginAllowed` uses `strings.HasSuffix` to check the origin, which leads to bypass via a malicious domain. This vulnerability is capable of breaking CORS policy and thus allowing any page to make requests and/or retrieve data on behalf of other users. Version 1.4.4 fixes this issue.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-03-06T18:31:31.309Z
Updated: 2024-08-05T20:09:47.572Z
Reserved: 2024-02-22T18:08:38.875Z
Link: CVE-2024-27302
Vulnrichment
Updated: 2024-08-02T00:27:59.895Z
NVD
Status : Awaiting Analysis
Published: 2024-03-06T19:15:08.330
Modified: 2024-03-06T21:42:48.053
Link: CVE-2024-27302
Redhat
No data.