CVE-2022-40083

NameCVE-2022-40083
DescriptionLabstack Echo v4.8.0 was discovered to contain an open redirect vulnerability via the Static Handler component. This vulnerability can be leveraged by attackers to cause a Server-Side Request Forgery (SSRF).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
golang-github-labstack-echo (PTS)bookworm4.2.1-3vulnerable
sid, trixie4.11.1-2fixed
golang-github-labstack-echo.v2 (PTS)buster2.2.0-1fixed
bullseye2.2.0-2fixed
golang-github-labstack-echo.v3 (PTS)buster3.3.5-1fixed
bullseye3.3.10-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
golang-github-labstack-echosource(unstable)4.11.1-1
golang-github-labstack-echo.v2source(unstable)(not affected)
golang-github-labstack-echo.v3source(unstable)(not affected)

Notes

[bookworm] - golang-github-labstack-echo <no-dsa> (Minor issue)
- golang-github-labstack-echo.v2 <not-affected> (Vulnerable code not present)
- golang-github-labstack-echo.v3 <not-affected> (Vulnerable code not present)
https://github.com/labstack/echo/commit/0ac4d74402391912ff6da733bb09fd4c3980b4e1 (v4.9.0)
https://github.com/labstack/echo/issues/2259

Search for package or bug name: Reporting problems