Miggo Logo

CVE-2023-37788:
goproxy Denial of Service vulnerability

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.30246%
Published
7/18/2023
Updated
11/11/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/elazarl/goproxygo< 0.0.0-20230731152917-f99041a5c0270.0.0-20230731152917-f99041a5c027

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests in the error logging path of the MITM handler where req.URL could be nil. The crash occurs specifically at https.go line 249 when trying to construct the error message using req.URL.Path without checking if req.URL exists. The GitHub issue #502 demonstrates this with a panic stack trace, and the fix in PR #507 adds nil checks for req.URL before accessing its fields. The CWE-400 classification confirms this is an uncontrolled resource consumption issue through crash-induced service termination.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*oproxy prior to ps*u*ov*rsion *.*.*-**************-************ w*s *is*ov*r** to *ont*in *n issu* w*i** **n l*** to * **ni*l o* s*rvi** (*oS) vi* unsp**i*i** v**tors.

Reasoning

T** vuln*r**ility m*ni**sts in t** *rror lo**in* p*t* o* t** MITM **n*l*r w**r* r*q.URL *oul* ** nil. T** *r*s* o**urs sp**i*i**lly *t `*ttps.*o` lin* *** w**n tryin* to *onstru*t t** *rror m*ss*** usin* r*q.URL.P*t* wit*out ****kin* i* r*q.URL *xist