CVE-2024-21494

All versions of the package github.com/greenpau/caddy-security are vulnerable to Authentication Bypass by Spoofing via the X-Forwarded-For header due to improper input sanitization. An attacker can spoof an IP address used in the user identity module (/whoami API endpoint). This could lead to unauthorized access if the system trusts this spoofed IP address.
Configurations

Configuration 1 (hide)

cpe:2.3:a:greenpau:caddy-security:*:*:*:*:*:*:*:*

History

24 Apr 2025, 15:15

Type Values Removed Values Added
References () https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ - () https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ - Third Party Advisory
References () https://github.com/greenpau/caddy-security/issues/266 - () https://github.com/greenpau/caddy-security/issues/266 - Issue Tracking
References () https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249859 - () https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249859 - Third Party Advisory
CWE CWE-79
First Time Greenpau caddy-security
Greenpau
CPE cpe:2.3:a:greenpau:caddy-security:*:*:*:*:*:*:*:*

Information

Published : 2024-02-17 05:15

Updated : 2025-04-24 15:15


NVD link : CVE-2024-21494

Mitre link : CVE-2024-21494

CVE.ORG link : CVE-2024-21494


JSON object : View

Products Affected

greenpau

  • caddy-security
CWE
CWE-290

Authentication Bypass by Spoofing

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')