All versions of the package github.com/greenpau/caddy-security are vulnerable to Authentication Bypass by Spoofing via the X-Forwarded-For header due to improper input sanitization. An attacker can spoof an IP address used in the user identity module (/whoami API endpoint). This could lead to unauthorized access if the system trusts this spoofed IP address.
References
| Link | Resource |
|---|---|
| https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ | Third Party Advisory |
| https://github.com/greenpau/caddy-security/issues/266 | Issue Tracking |
| https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249859 | Third Party Advisory |
| https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ | Third Party Advisory |
| https://github.com/greenpau/caddy-security/issues/266 | Issue Tracking |
| https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249859 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-02-17 05:15
Updated : 2025-04-24 15:15
NVD link : CVE-2024-21494
Mitre link : CVE-2024-21494
CVE.ORG link : CVE-2024-21494
JSON object : View
Products Affected
greenpau
- caddy-security
