We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2021-39185

Default CORS config allows any origin with credentials



Description

Http4s is a minimal, idiomatic Scala interface for HTTP services. In http4s versions 0.21.26 and prior, 0.22.0 through 0.22.2, 0.23.0, 0.23.1, and 1.0.0-M1 through 1.0.0-M24, the default CORS configuration is vulnerable to an origin reflection attack. The middleware is also susceptible to a Null Origin Attack. The problem is fixed in 0.21.27, 0.22.3, 0.23.2, and 1.0.0-M25. The original `CORS` implementation and `CORSConfig` are deprecated. See the GitHub GHSA for more information, including code examples and workarounds.

Reserved 2021-08-16 | Published 2021-09-01 | Updated 2024-08-04 | Assigner GitHub_M


CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-346: Origin Validation Error

Product status

< 0.21.27
affected

>= 0.22.0, < 0.22.3
affected

>= 0.23.0, < 0.23.2
affected

>= 1.0.0-M1, <= 1.0.0-M24
affected

References

github.com/...http4s/security/advisories/GHSA-52cf-226f-rhr6

github.com/http4s/http4s/releases/tag/v0.23.2

cve.org (CVE-2021-39185)

nvd.nist.gov (CVE-2021-39185)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2021-39185

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.