The route lookup process in beego before 1.12.9 and 2.x before 2.0.3 allows attackers to bypass access control. When a /p1/p2/:name route is configured, attackers can access it by appending .xml in various places (e.g., p1.xml instead of p1).
Link | Tags |
---|---|
https://github.com/beego/beego/issues/4946 | issue tracking patch exploit third party advisory |
https://beego.vip | product |
https://github.com/beego/beego/tree/v2.0.2 | third party advisory release notes |
https://github.com/advisories/GHSA-qx32-f6g6-fcfr |