Skip to content

Commit 6b86896

Browse files
committed
new vulnerability in github.com/oauth2-proxy/oauth2-proxy/v7
1 parent e12b394 commit 6b86896

File tree

1 file changed

+23
-13
lines changed

1 file changed

+23
-13
lines changed

input/new.json

Lines changed: 23 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,25 @@
11
{
2-
"package_name": "",
3-
"patch_versions": [],
4-
"vulnerable_ranges": [],
5-
"cwe": [],
6-
"tldr": "",
7-
"doest_this_affect_me": "",
8-
"how_to_fix": "",
9-
"vulnerable_to": "",
10-
"related_cve_id": "",
11-
"language": "",
12-
"severity_class": "",
13-
"aikido_score": 0,
14-
"changelog": ""
2+
"package_name": "github.com/oauth2-proxy/oauth2-proxy/v7",
3+
"patch_versions": [
4+
"7.13.0"
5+
],
6+
"vulnerable_ranges": [
7+
[
8+
"7.0.0",
9+
"7.12.0"
10+
]
11+
],
12+
"cwe": [
13+
"CWE-918"
14+
],
15+
"tldr": "Affected versions of this package are vulnerable to server-side request forgery (SSRF) via header smuggling. Authenticated users can inject underscore-prefixed `X-Forwarded_*` headers (e.g., `X_Forwarded-For`) which bypass the normal stripping logic, allowing privilege escalation or impersonation of upstream clients.",
16+
"doest_this_affect_me": "You are affected if you are using a version that falls within the vulnerable range.",
17+
"how_to_fix": "Upgrade the `github.com/oauth2-proxy/oauth2-proxy/v7` library to a patch version.",
18+
"reporter": "",
19+
"vulnerable_to": "Server-side Request Forgery (SSRF)",
20+
"related_cve_id": "CVE-2025-64484",
21+
"language": "GO",
22+
"severity_class": "HIGH",
23+
"aikido_score": 85,
24+
"changelog": "https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v7.13.0"
1525
}

0 commit comments

Comments
 (0)