Miggo Logo

GHSA-w9mr-28mw-j8hg:
Hop-by-hop abuse to malform header mutator

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
4/26/2023
Updated
4/27/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/ory/oathkeepergo< 0.40.30.40.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from how the header mutator adds headers without considering Connection header semantics in HTTP/1.1. The Go net/http package automatically removes headers listed in the Connection header during request forwarding. The HeaderMutator's Mutate function (responsible for injecting headers) doesn't validate() or modify the Connection header to prevent this stripping, making it the vulnerable component. This matches the attack pattern described where client-controlled Connection headers can remove security-critical headers added by the mutator.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t *ownstr**m s*rvi**s r*lyin* on t** pr*s*n** o* *****rs s*t *y t** `*****r` mut*tor *oul* ** *xploit**. * *li*nt **n *rop t** *****r s*t *y t** `*****r` mut*tor *y in*lu*in* t**t *****r's n*m* in t** `*onn**tion` *****r. *x*mpl* minim*l *o

Reasoning

T** vuln*r**ility st*ms *rom *ow t** *****r mut*tor ***s *****rs wit*out *onsi**rin* *onn**tion *****r s*m*nti*s in `*TTP/*.*`. T** *o `n*t/*ttp` p**k*** *utom*ti**lly r*mov*s *****rs list** in t** *onn**tion *****r *urin* r*qu*st *orw*r*in*. T** `**