{"id":"GO-2023-1792","summary":"Insecure wildcard CORS policy in github.com/rs/cors","details":"The CORS handler actively converts a wildcard CORS policy into reflecting an arbitrary Origin header value, which is incompatible with the CORS security design, and could lead to CORS misconfiguration security problems.","aliases":["CVE-2018-20744","GHSA-927h-x4qj-r242"],"modified":"2024-05-20T16:03:47Z","published":"2023-06-08T18:30:06Z","database_specific":{"review_status":"REVIEWED","url":"https://pkg.go.dev/vuln/GO-2023-1792"},"references":[{"type":"FIX","url":"https://github.com/rs/cors/pull/57"},{"type":"REPORT","url":"https://github.com/rs/cors/issues/55"}],"affected":[{"package":{"name":"github.com/rs/cors","ecosystem":"Go","purl":"pkg:golang/github.com/rs/cors"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.5.0"}]}],"ecosystem_specific":{"imports":[{"symbols":["AllowAll","Cors.HandlerFunc","Cors.ServeHTTP","Cors.handlePreflight","Default","New"],"path":"github.com/rs/cors"}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2023-1792.json"}}],"schema_version":"1.7.3"}