Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1yeGc5LWhncTctOHB3eM4AA3qR
Header spoofing in caddy-geo-ip
The caddy-geo-ip (aka GeoIP) middleware through 0.6.0 for Caddy 2, when trust_header X-Forwarded-For is used, allows attackers to spoof their source IP address via an X-Forwarded-For header, which may bypass a protection mechanism (trusted_proxy directive in reverse_proxy or IP address range restrictions).
Permalink: https://github.com/advisories/GHSA-rxg9-hgq7-8pwxJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1yeGc5LWhncTctOHB3eM4AA3qR
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 12 months ago
Updated: 12 months ago
CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Identifiers: GHSA-rxg9-hgq7-8pwx, CVE-2023-50463
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-50463
- https://github.com/shift72/caddy-geo-ip/issues/4
- https://caddyserver.com/v2
- https://github.com/shift72/caddy-geo-ip/tags
- https://github.com/advisories/GHSA-rxg9-hgq7-8pwx
Blast Radius: 1.0
Affected Packages
go:github.com/shift72/caddy-geo-ip
Dependent packages: 0Dependent repositories: 0
Downloads:
Affected Version Ranges: <= 0.6.0
No known fixed version
All affected versions: 0.1.0, 0.2.0, 0.3.0, 0.4.0, 0.5.0, 0.6.0