CVE-2023-37788:
goproxy Denial of Service vulnerability
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.30246%
CWE
Published
7/18/2023
Updated
11/11/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/elazarl/goproxy | go | < 0.0.0-20230731152917-f99041a5c027 | 0.0.0-20230731152917-f99041a5c027 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability manifests in the error logging path of the MITM handler where req.URL could be nil. The crash occurs specifically at https.go
line 249 when trying to construct the error message using req.URL.Path without checking if req.URL exists. The GitHub issue #502 demonstrates this with a panic stack trace, and the fix in PR #507 adds nil checks for req.URL before accessing its fields. The CWE-400 classification confirms this is an uncontrolled resource consumption issue through crash-induced service termination.