VYPR
High severityNVD Advisory· Published Jul 18, 2023· Updated Oct 28, 2024

CVE-2023-37788

CVE-2023-37788

Description

goproxy v1.1 was discovered to contain an issue which can lead to a Denial of service (DoS) via unspecified vectors.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A nil pointer dereference in goproxy v1.1 MITM mode causes denial of service when processing a malformed HTTP request.

Vulnerability

Description

CVE-2023-37788 is a denial-of-service (DoS) vulnerability in the goproxy library version 1.1, which is a Go-based HTTP/HTTPS proxy. The issue stems from a nil pointer dereference occurring when the proxy, running in Man-in-the-Middle (MITM) mode, receives a specially crafted HTTP request where the path is replaced with an asterisk (*). This malformed request causes a panic, crashing the proxy server and leading to a denial of service [4].

Exploitation

Details

To exploit the vulnerability, an attacker must be able to send traffic through the goproxy instance configured in MITM mode. The exploit is straightforward: the attacker sends a request like GET * HTTP/1.1 over an SSL connection to the proxy. The proxy's handleHttps function at https.go:249 fails to properly validate the request, resulting in a nil pointer dereference and a segmentation fault [4]. No authentication is required; the attack can be executed from any network client that can reach the proxy.

Impact

Successful exploitation causes the goproxy process to crash, disrupting all proxy services for legitimate users. Since goproxy is often used as a building block in larger systems (e.g., Kubernetes CSI drivers), a crash can have cascading effects on dependent applications [2]. The vulnerability has a CVSS severity of 5.9 (medium) and is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog, indicating active exploitation potential [3].

Mitigation

The issue has been addressed in commit f99041a5c (PR #507), which adds proper nil checks for the request object [1][2]. Users should update to a version of goproxy that includes this fix. For applications that cannot immediately update, a workaround is to avoid enabling MITM mode unless necessary, as the vulnerability only manifests in MITM mode [4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/elazarl/goproxyGo
< 0.0.0-20230731152917-f99041a5c0270.0.0-20230731152917-f99041a5c027

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.