CVE-2024-21498: Server-Side Request Forgery in github.com/greenpau/caddy-security
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.2585%
CWE
Published
2/17/2024
Updated
8/2/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/greenpau/caddy-security | go | <= 1.1.23 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper handling of the X-Forwarded-Host header in two key areas: QR code generation and redirect logic. The GitHub issue (#269) explicitly references code in respond_qrcode.go (line 38) and redirect.go (lines 69-101) where these headers are processed. The Trail of Bits blog confirms these functions use untrusted headers to construct security-sensitive URLs without validation, creating SSRF vectors. Both functions directly process attacker-controlled headers to determine system behavior, meeting the criteria for SSRF vulnerability root causes.