go-zero is a web and rpc framework. Go-zero allows user to specify a CORS Filter with a configurable allows param - which is an array of domains allowed in CORS policy. However, the `isOriginAllowed` uses `strings.HasSuffix` to check the origin, which leads to bypass via a malicious domain. This vulnerability is capable of breaking CORS policy and thus allowing any page to make requests and/or retrieve data on behalf of other users. Version 1.4.4 fixes this issue.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-03-06T18:31:31.309Z

Updated: 2024-08-05T20:09:47.572Z

Reserved: 2024-02-22T18:08:38.875Z

Link: CVE-2024-27302

cve-icon Vulnrichment

Updated: 2024-08-02T00:27:59.895Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-06T19:15:08.330

Modified: 2024-03-06T21:42:48.053

Link: CVE-2024-27302

cve-icon Redhat

No data.