go-zero is a web and rpc framework. Go-zero allows user to specify a CORS Filter with a configurable allows param - which is an array of domains allowed in CORS policy. However, the `isOriginAllowed` uses `strings.HasSuffix` to check the origin, which leads to bypass via a malicious domain. This vulnerability is capable of breaking CORS policy and thus allowing any page to make requests and/or retrieve data on behalf of other users. Version 1.4.4 fixes this issue.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-05T20:09:47.572Z

Reserved: 2024-02-22T18:08:38.875Z

Link: CVE-2024-27302

cve-icon Vulnrichment

Updated: 2024-08-02T00:27:59.895Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-06T19:15:08.330

Modified: 2024-11-21T09:04:16.990

Link: CVE-2024-27302

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.