Miggo Logo

CVE-2024-21583: github.com/gitpod-io/gitpod vulnerable to Cookie Tossing

4.1

CVSS Score
3.1

Basic Information

EPSS Score
0.29695%
Published
7/19/2024
Updated
10/31/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/gitpod-io/gitpodgo<= 0.8.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing __Host- prefix in cookie names. The CookieNameFromDomain function was directly responsible for generating insecure cookie names (evidenced by pre-patch code returning '_'+derived+'jwt2'). The commit da1053e explicitly fixes this by adding the __Host- prefix. This function's output directly controlled the cookie's security attributes, making it the root cause of the cookie tossing vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

V*rsions o* t** p**k*** *it*u*.*om/*itpo*-io/*itpo*/*ompon*nts/s*rv*r/*o/pk*/li* ***or* m*in-***.*****; v*rsions o* t** p**k*** *it*u*.*om/*itpo*-io/*itpo*/*ompon*nts/ws-proxy/pk*/proxy ***or* m*in-***.*****; v*rsions o* t** p**k*** *it*u*.*om/*itpo*

Reasoning

T** vuln*r**ility st*ms *rom missin* __*ost- pr**ix in *ooki* n*m*s. T** *ooki*N*m**rom*om*in *un*tion w*s *ir**tly r*sponsi*l* *or **n*r*tin* ins**ur* *ooki* n*m*s (*vi**n*** *y pr*-p*t** *o** r*turnin* '_'+**riv**+'_jwt*_'). T** *ommit ******* *xpl