Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-25211

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-28 Jun, 2024 | 00:00
Updated At-14 Mar, 2025 | 18:16
Rejected At-
Credits

parseWildcardRules in Gin-Gonic CORS middleware before 1.6.0 mishandles a wildcard at the end of an origin string, e.g., https://example.community/* is allowed when the intention is that only https://example.com/* should be allowed, and http://localhost.example.com/* is allowed when the intention is that only http://localhost/* should be allowed.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:28 Jun, 2024 | 00:00
Updated At:14 Mar, 2025 | 18:16
Rejected At:
▼CVE Numbering Authority (CNA)

parseWildcardRules in Gin-Gonic CORS middleware before 1.6.0 mishandles a wildcard at the end of an origin string, e.g., https://example.community/* is allowed when the intention is that only https://example.com/* should be allowed, and http://localhost.example.com/* is allowed when the intention is that only http://localhost/* should be allowed.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/gin-contrib/cors/pull/57
N/A
https://github.com/gin-contrib/cors/pull/106
N/A
https://github.com/gin-contrib/cors/compare/v1.5.0...v1.6.0
N/A
https://github.com/gin-contrib/cors/releases/tag/v1.6.0
N/A
https://github.com/gin-contrib/cors/commit/27b723a473efd80d5a498fa9f5933c80204c850d
N/A
Hyperlink: https://github.com/gin-contrib/cors/pull/57
Resource: N/A
Hyperlink: https://github.com/gin-contrib/cors/pull/106
Resource: N/A
Hyperlink: https://github.com/gin-contrib/cors/compare/v1.5.0...v1.6.0
Resource: N/A
Hyperlink: https://github.com/gin-contrib/cors/releases/tag/v1.6.0
Resource: N/A
Hyperlink: https://github.com/gin-contrib/cors/commit/27b723a473efd80d5a498fa9f5933c80204c850d
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Vendor
gin-contrib
Product
cors
CPEs
  • cpe:2.3:a:gin-contrib:cors:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 1.6.0 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-346CWE-346 Origin Validation Error
Type: CWE
CWE ID: CWE-346
Description: CWE-346 Origin Validation Error
Metrics
VersionBase scoreBase severityVector
3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/gin-contrib/cors/pull/57
x_transferred
https://github.com/gin-contrib/cors/pull/106
x_transferred
https://github.com/gin-contrib/cors/compare/v1.5.0...v1.6.0
x_transferred
https://github.com/gin-contrib/cors/releases/tag/v1.6.0
x_transferred
https://github.com/gin-contrib/cors/commit/27b723a473efd80d5a498fa9f5933c80204c850d
x_transferred
Hyperlink: https://github.com/gin-contrib/cors/pull/57
Resource:
x_transferred
Hyperlink: https://github.com/gin-contrib/cors/pull/106
Resource:
x_transferred
Hyperlink: https://github.com/gin-contrib/cors/compare/v1.5.0...v1.6.0
Resource:
x_transferred
Hyperlink: https://github.com/gin-contrib/cors/releases/tag/v1.6.0
Resource:
x_transferred
Hyperlink: https://github.com/gin-contrib/cors/commit/27b723a473efd80d5a498fa9f5933c80204c850d
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:29 Jun, 2024 | 00:15
Updated At:14 Mar, 2025 | 19:15

parseWildcardRules in Gin-Gonic CORS middleware before 1.6.0 mishandles a wildcard at the end of an origin string, e.g., https://example.community/* is allowed when the intention is that only https://example.com/* should be allowed, and http://localhost.example.com/* is allowed when the intention is that only http://localhost/* should be allowed.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-346Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-346
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/gin-contrib/cors/commit/27b723a473efd80d5a498fa9f5933c80204c850dcve@mitre.org
N/A
https://github.com/gin-contrib/cors/compare/v1.5.0...v1.6.0cve@mitre.org
N/A
https://github.com/gin-contrib/cors/pull/106cve@mitre.org
N/A
https://github.com/gin-contrib/cors/pull/57cve@mitre.org
N/A
https://github.com/gin-contrib/cors/releases/tag/v1.6.0cve@mitre.org
N/A
https://github.com/gin-contrib/cors/commit/27b723a473efd80d5a498fa9f5933c80204c850daf854a3a-2127-422b-91ae-364da2661108
N/A
https://github.com/gin-contrib/cors/compare/v1.5.0...v1.6.0af854a3a-2127-422b-91ae-364da2661108
N/A
https://github.com/gin-contrib/cors/pull/106af854a3a-2127-422b-91ae-364da2661108
N/A
https://github.com/gin-contrib/cors/pull/57af854a3a-2127-422b-91ae-364da2661108
N/A
https://github.com/gin-contrib/cors/releases/tag/v1.6.0af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: https://github.com/gin-contrib/cors/commit/27b723a473efd80d5a498fa9f5933c80204c850d
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://github.com/gin-contrib/cors/compare/v1.5.0...v1.6.0
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://github.com/gin-contrib/cors/pull/106
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://github.com/gin-contrib/cors/pull/57
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://github.com/gin-contrib/cors/releases/tag/v1.6.0
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://github.com/gin-contrib/cors/commit/27b723a473efd80d5a498fa9f5933c80204c850d
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://github.com/gin-contrib/cors/compare/v1.5.0...v1.6.0
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://github.com/gin-contrib/cors/pull/106
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://github.com/gin-contrib/cors/pull/57
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://github.com/gin-contrib/cors/releases/tag/v1.6.0
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

4Records found

CVE-2021-26291
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-9.1||CRITICAL
EPSS-45.48% / 97.52%
||
7 Day CHG-2.30%
Published-23 Apr, 2021 | 14:20
Updated-03 Aug, 2024 | 20:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
block repositories using http by default

Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html

Action-Not Available
Vendor-quarkusThe Apache Software FoundationOracle Corporation
Product-financial_services_analytical_applications_infrastructuremavengoldengate_big_data_and_application_adaptersquarkusApache Maven
CWE ID-CWE-346
Origin Validation Error
CVE-2021-44935
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.12% / 32.33%
||
7 Day CHG~0.00%
Published-14 Dec, 2021 | 12:03
Updated-04 Aug, 2024 | 04:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

glFusion CMS v1.7.9 is affected by an arbitrary user impersonation vulnerability in /public_html/comment.php. The attacker can complete the attack remotely without interaction.

Action-Not Available
Vendor-glfusionn/a
Product-glfusionn/a
CWE ID-CWE-346
Origin Validation Error
CVE-2021-39063
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.08% / 24.70%
||
7 Day CHG~0.00%
Published-13 Dec, 2021 | 18:35
Updated-17 Sep, 2024 | 00:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Spectrum Protect Plus 10.1.0.0 through 10.1.8.x uses Cross-Origin Resource Sharing (CORS) which could allow an attacker to carry out privileged actions and retrieve sensitive information due to a misconfiguration in access control headers. IBM X-Force ID: 214956.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, Inc
Product-linux_kernelspectrum_protect_plusSpectrum Protect Plus
CWE ID-CWE-346
Origin Validation Error
CVE-2021-39185
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.14% / 35.24%
||
7 Day CHG~0.00%
Published-01 Sep, 2021 | 19:25
Updated-04 Aug, 2024 | 01:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Default CORS config allows any origin with credentials

Http4s is a minimal, idiomatic Scala interface for HTTP services. In http4s versions 0.21.26 and prior, 0.22.0 through 0.22.2, 0.23.0, 0.23.1, and 1.0.0-M1 through 1.0.0-M24, the default CORS configuration is vulnerable to an origin reflection attack. The middleware is also susceptible to a Null Origin Attack. The problem is fixed in 0.21.27, 0.22.3, 0.23.2, and 1.0.0-M25. The original `CORS` implementation and `CORSConfig` are deprecated. See the GitHub GHSA for more information, including code examples and workarounds.

Action-Not Available
Vendor-typelevelhttp4s
Product-http4shttp4s
CWE ID-CWE-346
Origin Validation Error
Details not found