The route lookup process in beego through 1.12.4 and 2.x through 2.0.2 allows attackers to bypass access control. When a /p1/p2/:name route is configured, attackers can access it by appending .xml in various places (e.g., p1.xml instead of p1).
References
| Link | Resource |
|---|---|
| https://github.com/beego/beego/tree/v2.0.2 | Release Notes Third Party Advisory |
| https://beego.vip | Product |
| https://github.com/beego/beego/issues/4946 | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-05-21 19:15
Updated : 2022-06-02 19:02
NVD link : CVE-2022-31259
Mitre link : CVE-2022-31259
JSON object : View
Products Affected
beego
- beego
CWE
