GHSA-w9mr-28mw-j8hg:
Hop-by-hop abuse to malform header mutator
N/A
CVSS Score
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
-
Published
4/26/2023
Updated
4/27/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/ory/oathkeeper | go | < 0.40.3 | 0.40.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from how the header mutator adds headers without considering Connection header semantics in HTTP/1.1
. The Go net/http
package automatically removes headers listed in the Connection header during request forwarding. The HeaderMutator
's Mutate
function (responsible for injecting headers) doesn't validate()
or modify the Connection header to prevent this stripping, making it the vulnerable component. This matches the attack pattern described where client-controlled Connection headers can remove security-critical headers added by the mutator.