Miggo Logo

CVE-2019-11289: Cloud Foundry Routing Improper Input Validation vulnerability

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.71658%
Published
5/18/2021
Updated
5/20/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
code.cloudfoundry.org/goroutergo< 0.0.0-20191101214924-b1b5c44e050f0.0.0-20191101214924-b1b5c44e050f

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The commit diff shows the vulnerability was addressed by adding nonce length validation in AesGCM.Decrypt. The CWE-20 classification and Go vulnerability report (GO-2021-0102) specifically identify this function as the attack vector. Before the patch, missing length validation allowed malformed nonces to reach the cryptographic primitive, causing crashes through Go's cipher.AEAD interface which panics on invalid nonce sizes.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*lou* *oun*ry Routin*, *ll v*rsions ***or* *.*.*-**************-************, *o*s not prop*rly v*li**t* non** input. * r*mot* un*ut*oriz** m*li*ious us*r *oul* *or** * rout* s*rvi** r*qu*st usin* *n inv*li* non** t**t will **us* t** *orout*r to *r*s

Reasoning

T** *ommit *i** s*ows t** vuln*r**ility w*s ***r*ss** *y ***in* non** l*n*t* `v*li**tion` in `**s**M.***rypt`. T** *W*-** *l*ssi*i**tion *n* *o vuln*r**ility r*port (*O-****-****) sp**i*i**lly i**nti*y t*is `*un*tion` *s t** *tt**k v**tor. ***or* t**