In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
https://groups.google.com/g/golang-announce | third party advisory |
https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI | patch third party advisory exploit |
https://security.gentoo.org/glsa/202208-02 | third party advisory vendor advisory |