9.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
7.2 High
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
13.0%
The CORS middleware allows for insecure configurations that could potentially expose the application to multiple CORS-related vulnerabilities. Specifically, it allows setting the Access-Control-Allow-Origin header to a wildcard (“*”) while also having the Access-Control-Allow-Credentials set to true, which goes against recommended security best practices.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/gofiber/fiber/v2 | lt | 2.52.1 |
blog.portswigger.net/2016/10/exploiting-cors-misconfigurations-for.html
codeql.github.com/codeql-query-help/javascript/js-cors-misconfiguration-for-credentials
developer.mozilla.org/en-US/docs/Web/HTTP/CORS/Errors/CORSNotSupportingCredentials
fetch.spec.whatwg.org/#cors-protocol-and-credentials
github.com/gofiber/fiber/commit/f0cd3b44b086544a37886232d0530601f2406c23
github.com/gofiber/fiber/releases/tag/v2.52.1
github.com/gofiber/fiber/security/advisories/GHSA-fmg4-x8pw-hjhg
saturncloud.io/blog/cors-cannot-use-wildcard-in-accesscontrolalloworigin-when-credentials-flag-is-true
9.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
7.2 High
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
13.0%