Lucene search

K
githubGitHub Advisory DatabaseGHSA-RXG9-HGQ7-8PWX
HistoryDec 11, 2023 - 12:30 a.m.

Header spoofing in caddy-geo-ip

2023-12-1100:30:32
CWE-290
GitHub Advisory Database
github.com
22
caddy-geo-ip
vulnerability
header spoofing
ip address
x-forwarded-for
caddy 2
trust_header.

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

32.2%

The caddy-geo-ip (aka GeoIP) middleware through 0.6.0 for Caddy 2, when trust_header X-Forwarded-For is used, allows attackers to spoof their source IP address via an X-Forwarded-For header, which may bypass a protection mechanism (trusted_proxy directive in reverse_proxy or IP address range restrictions).

Affected configurations

Vulners
Node
shift72caddy-geo-ipRange0.6.0
VendorProductVersionCPE
shift72caddy-geo-ip*cpe:2.3:a:shift72:caddy-geo-ip:*:*:*:*:*:*:*:*

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

AI Score

6.8

Confidence

High

EPSS

0.001

Percentile

32.2%

Related for GHSA-RXG9-HGQ7-8PWX