Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Denial of Service (DoS)
Vulnerability Description
The package github.com/pires/go-proxyproto before 0.5.0 are vulnerable to Denial of Service (DoS) via the parseVersion1() function. The reader in this package is a default bufio.Reader wrapping a net.Conn. It will read from the connection until it finds a newline. Since no limits are implemented in the code, a deliberately malformed V1 header could be used to exhaust memory in a server process using this code - and create a DoS. This can be exploited by sending a stream starting with PROXY and continuing to send data (which does not contain a newline) until the target stops acknowledging. The risk here is small, because only trusted sources should be allowed to send proxy protocol headers.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
Vulnerability Type
N/A
Vulnerability Title
Pires go-proxyproto 安全漏洞
Vulnerability Description
Pires go-proxyproto是 (Pires)开源的一个应用软件。提供一种安全的方式,可以跨NAT或TCP代理的多层安全地传输连接信息功能。 github.com/pires/go-proxyproto before 0.5.0 存在安全漏洞,该漏洞源于在代码中没有实现限制,V1 header可以使用此代码耗尽服务器进程中的内存,并创建一个DoS。
CVSS Information
N/A
Vulnerability Type
N/A