CVE-2021-32163: Privilege escalation in MOSN
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.47534%
CWE
Published
2/17/2023
Updated
3/1/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| mosn.io/mosn | go | < 0.23.0 | 0.23.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper case-sensitive handling of URL paths in JWT authorization checks. The GitHub issue (#1633) demonstrates that requests with case-varied paths (e.g., '/indeX' vs '/index') bypassed authentication. The fix in PR #1637 modified the prefix matching logic to use case-insensitive comparisons when configured, confirming the vulnerability existed in the original case-sensitive Matches function implementation.