Miggo Logo

CVE-2023-37918: Dapr API token authentication bypass in HTTP endpoints

6.8

CVSS Score
3.1

Basic Information

EPSS Score
0.38712%
Published
7/21/2023
Updated
11/10/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/dapr/daprgo>= 1.11.0, < 1.11.21.11.2
github.com/dapr/daprgo< 1.10.91.10.9

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from two key functions: 1) ExcludedRoute in token.go performed a loose substring match for '/healthz' in URLs, including query parameters. 2) useAPIAuthentication in server.go used this check to bypass authentication. The commit diff shows these functions were modified to implement strict path/method checks (exact path match and GET method only), confirming their role in the vulnerability. The removal of ExcludedRoute and the rewritten authentication logic in the patch directly address the bypass mechanism described in the advisory.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry * vuln*r**ility **s ***n *oun* in **pr t**t *llows *yp*ssin* [*PI tok*n *ut**nti**tion](*ttps://*o*s.**pr.io/op*r*tions/s**urity/*pi-tok*n/), w*i** is us** *y t** **pr si****r to *ut**nti**t* **lls *omin* *rom t** *ppli**tion, wit* * w*

Reasoning

T** vuln*r**ility st*mm** *rom two k*y *un*tions: *) `*x*lu***Rout*` in `tok*n.*o` p*r*orm** * loos* su*strin* m*t** *or '/***lt*z' in URLs, in*lu*in* qu*ry p*r*m*t*rs. *) `us**PI*ut**nti**tion` in `s*rv*r.*o` us** t*is ****k to *yp*ss *ut**nti**tion