Miggo Logo

CVE-2022-23652:
Improper Authentication in Capsule Proxy

8.8

CVSS Score

Basic Information

EPSS Score
-
Published
2/23/2022
Updated
2/3/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/clastix/capsule-proxygo< 0.2.10.2.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper header sanitization in request handling. The patch introduced a new 'removingHopByHopHeaders' function called from 'impersonateHandler', indicating the previous lack of header sanitization was the flaw. The 'impersonateHandler' is directly responsible for setting impersonation headers and forwarding requests, making it the vulnerable entry point where header validation was missing. The connection header manipulation exploit path described in CVE-2022-23652 aligns with this code location.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t Usin* * m*li*ious `*onn**tion` *****r, *n *tt**k*r wit* * prop*r *ut**nti**tion m****nism *oul* st*rt * privil*** *s**l*tion tow*r*s t** Ku**rn*t*s *PI S*rv*r, **in* **l* to *xploit t** `*lust*r-**min` Rol* *oun* to `**psul*-proxy`. ###

Reasoning

T** vuln*r**ility st*ms *rom improp*r *****r s*nitiz*tion in r*qu*st **n*lin*. T** p*t** intro*u*** * n*w 'r*movin**op*y*op*****rs' *un*tion **ll** *rom 'imp*rson*t***n*l*r', in*i**tin* t** pr*vious l**k o* *****r s*nitiz*tion w*s t** *l*w. T** 'imp*