CVE-2022-41925: Tailscale daemon is vulnerable to information disclosure via CSRF
3.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.71518%
CWE
Published
11/21/2022
Updated
1/27/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| tailscale.com/cmd | go | < 1.32.3 | 1.32.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the peer API's lack of Host header validation (DNS rebinding) and insufficient CSRF protections. The handlePeerAPIRequest() function would be responsible for routing requests to vulnerable endpoints like /v0/env, while serveEnvVarEndpoint directly exposes sensitive environment variables. The researchers' blog post specifically mentions these endpoints being accessible via DNS rebinding, and the fix involved adding Host header allowlisting to the peer API handlers.