All versions of the package github.com/greenpau/caddy-security are vulnerable to Server-side Request Forgery (SSRF) via X-Forwarded-Host header manipulation. An attacker can expose sensitive information, interact with internal services, or exploit other vulnerabilities within the network by exploiting this vulnerability.
References
| Link | Resource |
|---|---|
| https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ | Third Party Advisory Issue Tracking |
| https://github.com/greenpau/caddy-security/issues/269 | Exploit Issue Tracking |
| https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249862 | Third Party Advisory |
| https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/ | Third Party Advisory Issue Tracking |
| https://github.com/greenpau/caddy-security/issues/269 | Exploit Issue Tracking |
| https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGREENPAUCADDYSECURITY-6249862 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-02-17 05:15
Updated : 2025-12-23 20:08
NVD link : CVE-2024-21498
Mitre link : CVE-2024-21498
CVE.ORG link : CVE-2024-21498
JSON object : View
Products Affected
authcrunch
- caddy-security
CWE
CWE-918
Server-Side Request Forgery (SSRF)
