The route lookup process in beego through 1.12.4 and 2.x through 2.0.2 allows attackers to bypass access control. When a /p1/p2/:name route is configured, attackers can access it by appending .xml in various places (e.g., p1.xml instead of p1).
CPE | Name | Operator | Version |
---|---|---|---|
go/github.com/beego/beego/v2 | ge | v2.0.0 | |
go/github.com/beego/beego/v2 | lt | v2.0.2 |