Vulnerability Description
Casdoor is a UI-first Identity and Access Management (IAM) / Single-Sign-On (SSO) platform. In Casdoor 1.577.0 and earlier, a logic vulnerability exists in the beego filter CorsFilter that allows any website to make cross domain requests to Casdoor as the logged in user. Due to the a logic error in checking only for a prefix when authenticating the Origin header, any domain can create a valid subdomain with a valid subdomain prefix (Ex: localhost.example.com), allowing the website to make requests to Casdoor as the current signed-in user.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Casbin | Casdoor | All versions |
Related Weaknesses (CWE)
References
- https://github.com/casdoor/casdoor/blob/v1.577.0/routers/cors_filter.go#L45Product
- https://securitylab.github.com/advisories/GHSL-2024-035_GHSL-2024-036_casdoor/ExploitThird Party Advisory
FAQ
What is CVE-2024-41657?
CVE-2024-41657 is a vulnerability with a CVSS score of 8.1 (HIGH). Casdoor is a UI-first Identity and Access Management (IAM) / Single-Sign-On (SSO) platform. In Casdoor 1.577.0 and earlier, a logic vulnerability exists in the beego filter CorsFilter that allows any ...
How severe is CVE-2024-41657?
CVE-2024-41657 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-41657?
Check the references section above for vendor advisories and patch information. Affected products include: Casbin Casdoor.