CVE-2023-41338
Summary
| CVE | CVE-2023-41338 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-09-08 19:15:00 UTC |
| Updated | 2023-09-12 19:12:00 UTC |
| Description | Fiber is an Express inspired web framework built in the go language. Versions of gofiber prior to 2.49.2 did not properly restrict access to localhost. This issue impacts users of our project who rely on the `ctx.IsFromLocal` method to restrict access to localhost requests. If exploited, it could allow unauthorized access to resources intended only for localhost. Setting `X-Forwarded-For: 127.0.0.1` in a request from a foreign host, will result in true for `ctx.IsFromLocal`. Access is limited to the scope of the affected process. This issue has been patched in version `2.49.2` with commit `b8c9ede6`. Users are advised to upgrade. There are no known workarounds to remediate this vulnerability without upgrading to the patched version. |
Risk And Classification
Problem Types: CWE-670
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Vulnerability in Ctx.IsFromLocal() · Advisory · gofiber/fiber · GitHub | MISC | github.com | |
| X-Forwarded-For - HTTP | MDN | MISC | developer.mozilla.org | |
| ???? Ctx | Fiber | MISC | docs.gofiber.io | |
| IsFromLocal corrected · gofiber/fiber@b8c9ede · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.