Miggo Logo

CVE-2024-38513:
Session Middleware Token Injection Vulnerability

10

CVSS Score
3.1

Basic Information

EPSS Score
0.56044%
Published
7/1/2024
Updated
7/5/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/gofiber/fibergo<= 2.52.42.52.5
github.com/gofiber/fiber/v2go<= 2.52.42.52.5
github.com/gofiber/fiber/v2/middleware/sessiongo<= 2.52.42.52.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability root cause was improper session ID handling in two key areas: 1) The Store.Get function accepted client-provided session IDs without validation, enabling session fixation. 2) Session decoding mechanisms lacked proper synchronization and validation, allowing injection when combined with controlled IDs. The patch added mutex locks and modified ID generation logic, with critical changes in store.go's Get method and session decoding flow. The functions were vulnerable because they trusted user input for session identification and lacked proper concurrency controls around session data manipulation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* s**urity vuln*r**ility **s ***n i**nti*i** in t** *i**r s*ssion mi**l*w*r* w**r* * us*r **n supply t**ir own s*ssion_i* v*lu*, l***in* to t** *r**tion o* * s*ssion wit* t**t k*y. ## Imp**t T** i**nti*i** vuln*r**ility is * s*ssion mi**l*w*r* issu*

Reasoning

T** vuln*r**ility root **us* w*s improp*r s*ssion I* **n*lin* in two k*y *r**s: *) T** `Stor*.**t` *un*tion ****pt** *li*nt-provi*** s*ssion I*s wit*out v*li**tion, *n**lin* s*ssion *ix*tion. *) S*ssion ***o*in* m****nisms l**k** prop*r syn**roniz*ti