Description
Usage of the CORS handler may apply improper CORS headers, allowing the requester to explicitly control the value of the Access-Control-Allow-Origin header, which bypasses the expected behavior of the Same Origin Policy.
Published: 2022-12-27
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-7663 Usage of the CORS handler may apply improper CORS headers, allowing the requester to explicitly control the value of the Access-Control-Allow-Origin header, which bypasses the expected behavior of the Same Origin Policy.
Github GHSA Github GHSA GHSA-jcr6-mmjj-pchw gorilla/handlers may allow requester to bypass expected behavior of the Same Origin Policy
History

Fri, 11 Apr 2025 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Gorillatoolkit Handlers
cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2025-04-11T23:02:21.962Z

Reserved: 2022-07-29T16:07:09.685Z

Link: CVE-2017-20146

cve-icon Vulnrichment

Updated: 2024-08-05T21:45:25.986Z

cve-icon NVD

Status : Modified

Published: 2022-12-27T22:15:11.070

Modified: 2025-04-11T23:15:25.743

Link: CVE-2017-20146

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-12-27T00:00:00Z

Links: CVE-2017-20146 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses