CVE-2019-25211: Gin mishandles a wildcard at the end of an origin string
(updated )
parseWildcardRules in Gin-Gonic CORS middleware before 1.6.0 mishandles a wildcard at the end of an origin string, e.g., https://example.community/* is allowed when the intention is that only https://example.com/* should be allowed, and http://localhost.example.com/* is allowed when the intention is that only http://localhost/* should be allowed.
References
- github.com/advisories/GHSA-869c-j7wc-8jqv
- github.com/gin-contrib/cors/commit/27b723a473efd80d5a498fa9f5933c80204c850d
- github.com/gin-contrib/cors/compare/v1.5.0...v1.6.0
- github.com/gin-contrib/cors/pull/106
- github.com/gin-contrib/cors/pull/57
- github.com/gin-contrib/cors/releases/tag/v1.6.0
- github.com/gin-gonic/gin
- nvd.nist.gov/vuln/detail/CVE-2019-25211
Detect and mitigate CVE-2019-25211 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →