Bug 2094982 (CVE-2022-1996)

Summary: CVE-2022-1996 go-restful: Authorization Bypass Through User-Controlled Key
Product: [Other] Security Response Reporter: Anten Skrabec <askrabec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: aazores, adam.kaplan, admiller, adudiak, agarcial, akashem, amackenz, amasferr, amctagga, anpicker, aos-bugs, aos-network-edge-staff, aos-odin-bot, aos-team-ota, aputtur, bbennett, bcoca, bkundu, blaise, bmontgom, bradley.g.smith, bthurber, cdaley, charlie, chazlett, chousekn, cmeyers, cnv-qe-bugs, dagray, davide, davidn, dcadzow, dholler, dkenigsb, dperaza, dustymabe, dwalsh, dwest, eaguilar, ebakerupw, ebaron, eparis, etamir, fdeutsch, gblomqui, go-sig, ijolliff, jacding, jburrell, jcajka, jcammara, jcantril, jchui, jerzhang, jhadvig, jhardy, jhrozek, jitsingh, jkang, jmencak, jobarker, joelsmith, jokerman, jpallich, jwendell, jwon, lball, lbragsta, lhinds, lmeyer, mabashia, maszulik, matzew, maxwell, mfojtik, mkudlej, mrogers, nbecker, notting, nparekh, nstielau, obulatov, ocp-storage-bot, ocs-bugs, o.lemasle, openshift-release-oversight, oramraz, osapryki, oskutka, ovanders, pbunev, pegoncal, pehunt, phoracek, pjindal, rcernich, relrod, rfreiman, rhuss, rpetrell, rphillips, rrajasek, ryncsn, sanchezl, santiago, sdoran, sejug, sfroberg, sgott, slaznick, smcdonal, smullick, spandura, spasquie, sponnaga, stcannon, sttts, surbania, team-winc-bot, tfister, tjochec, tkuratom, tsedovic, tsweeney, twalsh, vkumar, wenshen, xiyuan, xxia, zebob.m
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: go-restful 3.8.0 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in CORS Filter feature from the go-restful package. When a user inputs a domain which is in AllowedDomains, all domains starting with the same pattern are accepted. This issue could allow an attacker to break the CORS policy by allowing any page to make requests and retrieve data on behalf of users.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-12-07 22:32:46 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2097967, 2097965, 2097966, 2097968, 2097969, 2097970, 2097971, 2097972, 2097973, 2097974, 2097975, 2097976, 2097977, 2097978, 2097979, 2097980, 2097981, 2097982, 2097983, 2097984, 2097987, 2097991, 2097992, 2097993, 2097994, 2097995, 2097996, 2097997, 2097998, 2097999, 2098000, 2098001, 2098002, 2098003, 2098005, 2098006, 2098007, 2098008, 2098009, 2098010, 2098011, 2098012, 2098013, 2098014, 2098015, 2098016, 2098017, 2098018, 2098019, 2098020, 2098021, 2098022, 2098023, 2098024, 2098025, 2098026, 2098027, 2098028, 2098030, 2098031, 2098032, 2098033, 2098034, 2098035, 2098036, 2098037, 2098038, 2098039, 2098040, 2098041, 2098042, 2098043, 2098044, 2098045, 2098046, 2098047, 2098524, 2098525, 2098526, 2098527, 2100750, 2128375, 2128378, 2128380, 2128402, 2128403, 2128404, 2128405, 2128406, 2128407, 2128408, 2128409    
Bug Blocks: 2094985    

Description Anten Skrabec 2022-06-08 18:51:16 UTC
Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3.8.0.

https://huntr.dev/bounties/be837427-415c-4d8c-808b-62ce20aa84f1
https://github.com/emicklei/go-restful/commit/fd3c327a379ce08c68ef18765bdc925f5d9bad10

Comment 2 Avinash Hanwate 2022-06-17 05:42:47 UTC
Created containerd tracking bugs for this issue:

Affects: epel-7 [bug 2097966]
Affects: fedora-all [bug 2097965]


Created cri-o:1.19/cri-o tracking bugs for this issue:

Affects: fedora-all [bug 2097968]


Created cri-o:1.20/cri-o tracking bugs for this issue:

Affects: fedora-all [bug 2097969]


Created cri-o:1.21/cri-o tracking bugs for this issue:

Affects: fedora-all [bug 2097970]


Created cri-o:1.22/cri-o tracking bugs for this issue:

Affects: fedora-all [bug 2097971]


Created golang-github-emicklei-restful tracking bugs for this issue:

Affects: fedora-all [bug 2097972]


Created golang-github-emicklei-restful-swagger12 tracking bugs for this issue:

Affects: fedora-all [bug 2097973]


Created golang-github-tonistiigi-opentelemetry-contrib tracking bugs for this issue:

Affects: fedora-all [bug 2097974]


Created golang-helm-3 tracking bugs for this issue:

Affects: fedora-all [bug 2097975]


Created golang-k8s-apiextensions-apiserver tracking bugs for this issue:

Affects: fedora-all [bug 2097976]


Created golang-k8s-code-generator tracking bugs for this issue:

Affects: fedora-all [bug 2097977]


Created golang-k8s-kube-openapi tracking bugs for this issue:

Affects: fedora-all [bug 2097978]


Created golang-k8s-pod-security-admission tracking bugs for this issue:

Affects: fedora-all [bug 2097979]


Created golang-k8s-sample-apiserver tracking bugs for this issue:

Affects: fedora-all [bug 2097980]


Created golang-opentelemetry-contrib tracking bugs for this issue:

Affects: fedora-all [bug 2097981]


Created golang-opentelemetry-contrib-0.20 tracking bugs for this issue:

Affects: fedora-all [bug 2097982]


Created kompose tracking bugs for this issue:

Affects: epel-7 [bug 2097967]
Affects: fedora-all [bug 2097983]


Created origin tracking bugs for this issue:

Affects: fedora-all [bug 2097984]

Comment 3 Avinash Hanwate 2022-06-17 05:51:41 UTC
Created golang-k8s-kube-aggregator tracking bugs for this issue:

Affects: fedora-all [bug 2097987]

Comment 14 errata-xmlrpc 2022-08-10 11:37:09 UTC
This issue has been addressed in the following products:

  Openshift Serverless 1 on RHEL 8

Via RHSA-2022:6042 https://access.redhat.com/errata/RHSA-2022:6042

Comment 15 errata-xmlrpc 2022-08-10 13:15:45 UTC
This issue has been addressed in the following products:

  Openshift Serveless 1.24

Via RHSA-2022:6040 https://access.redhat.com/errata/RHSA-2022:6040

Comment 18 errata-xmlrpc 2022-09-06 14:01:51 UTC
This issue has been addressed in the following products:

  RHEL-8-CNV-4.10

Via RHSA-2022:6351 https://access.redhat.com/errata/RHSA-2022:6351

Comment 26 errata-xmlrpc 2022-11-22 17:46:54 UTC
This issue has been addressed in the following products:

  RHEL-8-CNV-4.9

Via RHSA-2022:8609 https://access.redhat.com/errata/RHSA-2022:8609

Comment 28 Product Security DevOps Team 2022-12-07 22:32:35 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-1996

Comment 30 errata-xmlrpc 2023-02-20 12:41:06 UTC
This issue has been addressed in the following products:

  Cryostat 2 on RHEL 8

Via RHSA-2023:0814 https://access.redhat.com/errata/RHSA-2023:0814

Comment 32 errata-xmlrpc 2023-05-18 15:51:57 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift GitOps 1.8

Via RHSA-2023:3229 https://access.redhat.com/errata/RHSA-2023:3229

Comment 33 errata-xmlrpc 2023-06-09 15:38:57 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift GitOps 1.9

Via RHSA-2023:3557 https://access.redhat.com/errata/RHSA-2023:3557