Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-41338

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-08 Sep, 2023 | 18:17
Updated At-26 Sep, 2024 | 14:05
Rejected At-
Credits

Vulnerability in Ctx.IsFromLocal() in gofiber

Fiber is an Express inspired web framework built in the go language. Versions of gofiber prior to 2.49.2 did not properly restrict access to localhost. This issue impacts users of our project who rely on the `ctx.IsFromLocal` method to restrict access to localhost requests. If exploited, it could allow unauthorized access to resources intended only for localhost. Setting `X-Forwarded-For: 127.0.0.1` in a request from a foreign host, will result in true for `ctx.IsFromLocal`. Access is limited to the scope of the affected process. This issue has been patched in version `2.49.2` with commit `b8c9ede6`. Users are advised to upgrade. There are no known workarounds to remediate this vulnerability without upgrading to the patched version.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:08 Sep, 2023 | 18:17
Updated At:26 Sep, 2024 | 14:05
Rejected At:
▼CVE Numbering Authority (CNA)
Vulnerability in Ctx.IsFromLocal() in gofiber

Fiber is an Express inspired web framework built in the go language. Versions of gofiber prior to 2.49.2 did not properly restrict access to localhost. This issue impacts users of our project who rely on the `ctx.IsFromLocal` method to restrict access to localhost requests. If exploited, it could allow unauthorized access to resources intended only for localhost. Setting `X-Forwarded-For: 127.0.0.1` in a request from a foreign host, will result in true for `ctx.IsFromLocal`. Access is limited to the scope of the affected process. This issue has been patched in version `2.49.2` with commit `b8c9ede6`. Users are advised to upgrade. There are no known workarounds to remediate this vulnerability without upgrading to the patched version.

Affected Products
Vendor
gofiber
Product
fiber
Versions
Affected
  • < 2.49.2
Problem Types
TypeCWE IDDescription
CWECWE-670CWE-670: Always-Incorrect Control Flow Implementation
Type: CWE
CWE ID: CWE-670
Description: CWE-670: Always-Incorrect Control Flow Implementation
Metrics
VersionBase scoreBase severityVector
3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/gofiber/fiber/security/advisories/GHSA-3q5p-3558-364f
x_refsource_CONFIRM
https://github.com/gofiber/fiber/commit/b8c9ede6efa231116c4bd8bb9d5e03eac1cb76dc
x_refsource_MISC
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For
x_refsource_MISC
https://docs.gofiber.io/api/ctx#isfromlocal
x_refsource_MISC
Hyperlink: https://github.com/gofiber/fiber/security/advisories/GHSA-3q5p-3558-364f
Resource:
x_refsource_CONFIRM
Hyperlink: https://github.com/gofiber/fiber/commit/b8c9ede6efa231116c4bd8bb9d5e03eac1cb76dc
Resource:
x_refsource_MISC
Hyperlink: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For
Resource:
x_refsource_MISC
Hyperlink: https://docs.gofiber.io/api/ctx#isfromlocal
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/gofiber/fiber/security/advisories/GHSA-3q5p-3558-364f
x_refsource_CONFIRM
x_transferred
https://github.com/gofiber/fiber/commit/b8c9ede6efa231116c4bd8bb9d5e03eac1cb76dc
x_refsource_MISC
x_transferred
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For
x_refsource_MISC
x_transferred
https://docs.gofiber.io/api/ctx#isfromlocal
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/gofiber/fiber/security/advisories/GHSA-3q5p-3558-364f
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://github.com/gofiber/fiber/commit/b8c9ede6efa231116c4bd8bb9d5e03eac1cb76dc
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://docs.gofiber.io/api/ctx#isfromlocal
Resource:
x_refsource_MISC
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Vendor
gofiber
Product
fiber
CPEs
  • cpe:2.3:a:gofiber:fiber:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 2.49.2 (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:08 Sep, 2023 | 19:15
Updated At:12 Sep, 2023 | 19:12

Fiber is an Express inspired web framework built in the go language. Versions of gofiber prior to 2.49.2 did not properly restrict access to localhost. This issue impacts users of our project who rely on the `ctx.IsFromLocal` method to restrict access to localhost requests. If exploited, it could allow unauthorized access to resources intended only for localhost. Setting `X-Forwarded-For: 127.0.0.1` in a request from a foreign host, will result in true for `ctx.IsFromLocal`. Access is limited to the scope of the affected process. This issue has been patched in version `2.49.2` with commit `b8c9ede6`. Users are advised to upgrade. There are no known workarounds to remediate this vulnerability without upgrading to the patched version.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Secondary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CPE Matches

gofiber
gofiber
>>fiber>>Versions before 2.49.2(exclusive)
cpe:2.3:a:gofiber:fiber:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-670Primarysecurity-advisories@github.com
CWE ID: CWE-670
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-Forsecurity-advisories@github.com
Technical Description
https://docs.gofiber.io/api/ctx#isfromlocalsecurity-advisories@github.com
Product
https://github.com/gofiber/fiber/commit/b8c9ede6efa231116c4bd8bb9d5e03eac1cb76dcsecurity-advisories@github.com
Patch
https://github.com/gofiber/fiber/security/advisories/GHSA-3q5p-3558-364fsecurity-advisories@github.com
Vendor Advisory
Hyperlink: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For
Source: security-advisories@github.com
Resource:
Technical Description
Hyperlink: https://docs.gofiber.io/api/ctx#isfromlocal
Source: security-advisories@github.com
Resource:
Product
Hyperlink: https://github.com/gofiber/fiber/commit/b8c9ede6efa231116c4bd8bb9d5e03eac1cb76dc
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/gofiber/fiber/security/advisories/GHSA-3q5p-3558-364f
Source: security-advisories@github.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

2Records found

CVE-2020-5753
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.23% / 45.95%
||
7 Day CHG~0.00%
Published-20 May, 2020 | 13:40
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Signal Private Messenger Android v4.59.0 and up and iOS v3.8.1.5 and up allows a remote non-contact to ring a victim's Signal phone and disclose currently used DNS server due to ICE Candidate handling before call is answered or declined.

Action-Not Available
Vendor-signaln/a
Product-signalprivate_messengerSignal Private Messenger
CWE ID-CWE-670
Always-Incorrect Control Flow Implementation
CVE-2024-35190
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.13% / 33.57%
||
7 Day CHG+0.09%
Published-17 May, 2024 | 16:55
Updated-26 Aug, 2025 | 16:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Asterisk' res_pjsip_endpoint_identifier_ip: wrongly matches ALL unauthorized SIP requests

Asterisk is an open source private branch exchange and telephony toolkit. After upgrade to 18.23.0, ALL unauthorized SIP requests are identified as PJSIP Endpoint of local asterisk server. This vulnerability is fixed in 18.23.1, 20.8.1, and 21.3.1.

Action-Not Available
Vendor-AsteriskSangoma Technologies Corp.
Product-asteriskasteriskasterisk
CWE ID-CWE-303
Incorrect Implementation of Authentication Algorithm
CWE ID-CWE-480
Use of Incorrect Operator
CWE ID-CWE-670
Always-Incorrect Control Flow Implementation
Details not found