Access control bypass in beego
Critical severity
GitHub Reviewed
Published
May 22, 2022
to the GitHub Advisory Database
•
Updated Aug 29, 2023
Description
Published by the National Vulnerability Database
May 21, 2022
Published to the GitHub Advisory Database
May 22, 2022
Reviewed
May 25, 2022
Last updated
Aug 29, 2023
The route lookup process in beego prior to 1.12.9 and 2.x prior to 2.0.3 allows attackers to bypass access control. When a /
p1
/p2
/:name
route is configured, attackers can access it by appending .xml in various places (e.g., p1.xml instead of p1).References