Lucene search

K
githubGitHub Advisory DatabaseGHSA-5X5Q-CQF6-GJ8R
HistoryAug 29, 2024 - 6:31 p.m.

Serilog Client IP Spoofing vulnerability

2024-08-2918:31:36
CWE-79
CWE-348
GitHub Advisory Database
github.com
6
serilog
client ip
spoofing
vulnerability
log files
http requests
x-forwarded-for
client-ip

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

17.7%

Serilog (before v2.1.0) contains a Client IP Spoofing vulnerability, which allows attackers to falsify their IP addresses in log files by specifying an arbitrary IP as a value of X-Forwarded-For or Client-Ip headers while performing HTTP requests.

It is not possible to configure Serilog.Enrichers.ClientInfo to not trust the X-Forwarded-For header.

Affected configurations

Vulners
Node
serilog.enrichers.clientinfoRange<2.1.0
VendorProductVersionCPE
*serilog.enrichers.clientinfo*cpe:2.3:a:*:serilog.enrichers.clientinfo:*:*:*:*:*:*:*:*

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

17.7%

Related for GHSA-5X5Q-CQF6-GJ8R