| { |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0", |
| "cveMetadata": { |
| "cveId": "CVE-2025-47908" |
| }, |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc" |
| }, |
| "title": "Denial of service via malicious preflight requests in github.com/rs/cors", |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "Middleware causes a prohibitive amount of heap allocations when processing malicious preflight requests that include a Access-Control-Request-Headers (ACRH) header whose value contains many commas. This behavior can be abused by attackers to produce undue load on the middleware/server as an attempt to cause a denial of service." |
| } |
| ], |
| "affected": [ |
| { |
| "vendor": "github.com/rs/cors", |
| "product": "github.com/rs/cors", |
| "collectionURL": "https://pkg.go.dev", |
| "packageName": "github.com/rs/cors", |
| "versions": [ |
| { |
| "version": "1.9.0", |
| "lessThan": "1.11.0", |
| "status": "affected", |
| "versionType": "semver" |
| } |
| ], |
| "programRoutines": [ |
| { |
| "name": "Cors.handlePreflight" |
| }, |
| { |
| "name": "Cors.areHeadersAllowed" |
| }, |
| { |
| "name": "New" |
| }, |
| { |
| "name": "splitHeaderValues" |
| }, |
| { |
| "name": "AllowAll" |
| }, |
| { |
| "name": "Cors.HandlerFunc" |
| }, |
| { |
| "name": "Cors.ServeHTTP" |
| }, |
| { |
| "name": "Default" |
| } |
| ], |
| "defaultStatus": "unaffected" |
| } |
| ], |
| "problemTypes": [ |
| { |
| "descriptions": [ |
| { |
| "lang": "en", |
| "description": "CWE-1325: Improperly Controlled Sequential Memory Allocation" |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://github.com/rs/cors/pull/171" |
| }, |
| { |
| "url": "https://github.com/rs/cors/issues/170" |
| }, |
| { |
| "url": "https://pkg.go.dev/vuln/GO-2024-2883" |
| } |
| ], |
| "credits": [ |
| { |
| "lang": "en", |
| "value": "@jub0bs" |
| } |
| ] |
| } |
| } |
| } |