Serilog before v2.1.0 was discovered to contain a Client IP Spoofing vulnerability, which allows attackers to falsify their IP addresses by specifying an arbitrary IP as a value of X-Forwarded-For or Client-Ip headers while performing HTTP requests.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/serilog-contrib/serilog-enrichers-clientinfo/issues/29 | issue tracking |
https://github.com/serilog-contrib/serilog-enrichers-clientinfo/releases/tag/v2.1.0 | release notes |