CVE-2023-37788
Description
goproxy v1.1 was discovered to contain an issue which can lead to a Denial of service (DoS) via unspecified vectors.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A nil pointer dereference in goproxy v1.1 MITM mode causes denial of service when processing a malformed HTTP request.
Vulnerability
Description
CVE-2023-37788 is a denial-of-service (DoS) vulnerability in the goproxy library version 1.1, which is a Go-based HTTP/HTTPS proxy. The issue stems from a nil pointer dereference occurring when the proxy, running in Man-in-the-Middle (MITM) mode, receives a specially crafted HTTP request where the path is replaced with an asterisk (*). This malformed request causes a panic, crashing the proxy server and leading to a denial of service [4].
Exploitation
Details
To exploit the vulnerability, an attacker must be able to send traffic through the goproxy instance configured in MITM mode. The exploit is straightforward: the attacker sends a request like GET * HTTP/1.1 over an SSL connection to the proxy. The proxy's handleHttps function at https.go:249 fails to properly validate the request, resulting in a nil pointer dereference and a segmentation fault [4]. No authentication is required; the attack can be executed from any network client that can reach the proxy.
Impact
Successful exploitation causes the goproxy process to crash, disrupting all proxy services for legitimate users. Since goproxy is often used as a building block in larger systems (e.g., Kubernetes CSI drivers), a crash can have cascading effects on dependent applications [2]. The vulnerability has a CVSS severity of 5.9 (medium) and is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog, indicating active exploitation potential [3].
Mitigation
The issue has been addressed in commit f99041a5c (PR #507), which adds proper nil checks for the request object [1][2]. Users should update to a version of goproxy that includes this fix. For applications that cannot immediately update, a workaround is to avoid enabling MITM mode unless necessary, as the vulnerability only manifests in MITM mode [4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/elazarl/goproxyGo | < 0.0.0-20230731152917-f99041a5c027 | 0.0.0-20230731152917-f99041a5c027 |
Affected products
3- goproxy/goproxydescription
- osv-coords2 versions
< 0+ 1 more
- (no CPE)range: < 0
- (no CPE)range: < 0.0.0-20230731152917-f99041a5c027
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-4r8x-2p26-976pghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-37788ghsaADVISORY
- github.com/elazarl/goproxy/issues/502ghsaWEB
- github.com/elazarl/goproxy/pull/507ghsaWEB
News mentions
0No linked articles in our index yet.