Casdoor is a UI-first Identity and Access Management (IAM) / Single-Sign-On (SSO) platform. In Casdoor 1.577.0 and earlier, a logic vulnerability exists in the beego filter CorsFilter that allows any website to make cross domain requests to Casdoor as the logged in user. Due to the a logic error in checking only for a prefix when authenticating the Origin header, any domain can create a valid subdomain with a valid subdomain prefix (Ex: localhost.example.com), allowing the website to make requests to Casdoor as the current signed-in user.
The product uses a cross-domain policy file that includes domains that should not be trusted.
The product compares two entities in a security-relevant context, but the comparison is incorrect, which may lead to resultant weaknesses.
Link | Tags |
---|---|
https://securitylab.github.com/advisories/GHSL-2024-035_GHSL-2024-036_casdoor/ | third party advisory exploit |
https://github.com/casdoor/casdoor/blob/v1.577.0/routers/cors_filter.go#L45 | product |