{"id":"GHSA-fqh4-rh59-xhvf","summary":"github.com/pires/go-proxyproto denial of service vulnerability","details":"The package `github.com/pires/go-proxyproto` before 0.5.0 are vulnerable to Denial of Service (DoS) via the `parseVersion1()` function. The reader in this package is a default `bufio.Reader` wrapping a `net.Conn`. It will read from the connection until it finds a newline. Since no limits are implemented in the code, a deliberately malformed V1 header could be used to exhaust memory in a server process using this code - and create a DoS. This can be exploited by sending a stream starting with PROXY and continuing to send data (which does not contain a newline) until the target stops acknowledging. The risk here is small, because only trusted sources should be allowed to send proxy protocol headers.","aliases":["CVE-2021-23351"],"modified":"2025-01-14T08:57:16.387794Z","published":"2021-05-18T21:07:43Z","database_specific":{"cwe_ids":["CWE-400"],"nvd_published_at":null,"github_reviewed":true,"github_reviewed_at":"2021-05-18T21:03:39Z","severity":"MODERATE"},"references":[{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23351"},{"type":"WEB","url":"https://github.com/pires/go-proxyproto/issues/69"},{"type":"WEB","url":"https://github.com/pires/go-proxyproto/pull/71"},{"type":"WEB","url":"https://github.com/pires/go-proxyproto/commit/7f48261db810703d173f27f3309a808cc2b49b8b"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BNVGJMVI3ZTZ675EFPUHPGXCKCGSX46"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36IBVOZXRTWM7MGTRUTOM56P5RR74VU"},{"type":"WEB","url":"https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1081577"}],"affected":[{"package":{"name":"github.com/pires/go-proxyproto","ecosystem":"Go","purl":"pkg:golang/github.com/pires/go-proxyproto"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"0.5.0"}]}],"database_specific":{"source":"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-fqh4-rh59-xhvf/GHSA-fqh4-rh59-xhvf.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}