VYPR

Go modules package

github.com/greenpau/caddy-security

pkg:golang/github.com/greenpau/caddy-security

Vulnerabilities (10)

  • CVE-2024-21493Feb 17, 2024
    affected <= 1.1.23

    All versions of the package github.com/greenpau/caddy-security are vulnerable to Improper Validation of Array Index when parsing a Caddyfile. Multiple parsing functions in the affected library do not validate whether their input values are nil before attempting to access elements

  • CVE-2024-21495Feb 17, 2024
    affected <= 1.0.42

    Versions of the package github.com/greenpau/caddy-security before 1.0.42 are vulnerable to Insecure Randomness due to using an insecure random number generation library which could possibly be predicted via a brute-force search. Attackers could use the potentially predictable non

  • CVE-2024-21494Feb 17, 2024
    affected <= 1.1.23

    All versions of the package github.com/greenpau/caddy-security are vulnerable to Authentication Bypass by Spoofing via the X-Forwarded-For header due to improper input sanitization. An attacker can spoof an IP address used in the user identity module (/whoami API endpoint). This

  • CVE-2024-21500Feb 17, 2024
    affected <= 1.1.23

    All versions of the package github.com/greenpau/caddy-security are vulnerable to Improper Restriction of Excessive Authentication Attempts via the two-factor authentication (2FA). Although the application blocks the user after several failed attempts to provide 2FA codes, attacke

  • CVE-2024-21499Feb 17, 2024
    affected <= 1.1.23

    All versions of the package github.com/greenpau/caddy-security are vulnerable to HTTP Header Injection via the X-Forwarded-Proto header due to redirecting to the injected protocol.Exploiting this vulnerability could lead to bypass of security mechanisms or confusion in handling T

  • CVE-2024-21498Feb 17, 2024
    affected <= 1.1.23

    All versions of the package github.com/greenpau/caddy-security are vulnerable to Server-side Request Forgery (SSRF) via X-Forwarded-Host header manipulation. An attacker can expose sensitive information, interact with internal services, or exploit other vulnerabilities within the

  • CVE-2024-21497Feb 17, 2024
    affected <= 1.1.23

    Versions of the package github.com/greenpau/caddy-security are vulnerable to Open Redirect via the redirect_url parameter. An attacker could perform a phishing attack and trick users into visiting a malicious website by crafting a convincing URL with this parameter. To exploit t

  • CVE-2024-21492Feb 17, 2024
    affected <= 1.1.23

    All versions of the package github.com/greenpau/caddy-security are vulnerable to Insufficient Session Expiration due to improper user session invalidation upon clicking the "Sign Out" button. User sessions remain valid even after requests are sent to /logout and /oauth2/google/lo

  • CVE-2024-21496Feb 17, 2024
    affected <= 1.1.23

    All versions of the package github.com/greenpau/caddy-security are vulnerable to Cross-site Scripting (XSS) via the Referer header, due to improper input sanitization. Although the Referer header is sanitized by escaping some characters that can allow XSS (e.g., [&], [<], [>], ["

  • CVE-2023-52430Feb 12, 2024
    affected <= 1.1.20

    The caddy-security plugin 1.1.20 for Caddy allows reflected XSS via a GET request to a URL that contains an XSS payload and begins with either a /admin or /settings/mfa/delete/ substring.