Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWZxaDQtcmg1OS14aHZm

github.com/pires/go-proxyproto denial of service vulnerability

The package github.com/pires/go-proxyproto before 0.5.0 are vulnerable to Denial of Service (DoS) via the parseVersion1() function. The reader in this package is a default bufio.Reader wrapping a net.Conn. It will read from the connection until it finds a newline. Since no limits are implemented in the code, a deliberately malformed V1 header could be used to exhaust memory in a server process using this code - and create a DoS. This can be exploited by sending a stream starting with PROXY and continuing to send data (which does not contain a newline) until the target stops acknowledging. The risk here is small, because only trusted sources should be allowed to send proxy protocol headers.

Permalink: https://github.com/advisories/GHSA-fqh4-rh59-xhvf
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWZxaDQtcmg1OS14aHZm
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 3 years ago
Updated: 8 months ago


CVSS Score: 4.9
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

Identifiers: GHSA-fqh4-rh59-xhvf, CVE-2021-23351
References: Repository: https://github.com/pires/go-proxyproto
Blast Radius: 15.9

Affected Packages

go:github.com/pires/go-proxyproto
Dependent packages: 910
Dependent repositories: 1,769
Downloads:
Affected Version Ranges: < 0.5.0
Fixed in: 0.5.0
All affected versions: 0.1.3, 0.2.0, 0.3.0, 0.3.1, 0.3.2, 0.3.3, 0.4.0, 0.4.1, 0.4.2
All unaffected versions: 0.5.0, 0.6.0, 0.6.1, 0.6.2, 0.7.0