Name | CVE-2022-40083 |
Description | Labstack Echo v4.8.0 was discovered to contain an open redirect vulnerability via the Static Handler component. This vulnerability can be leveraged by attackers to cause a Server-Side Request Forgery (SSRF). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
The information below is based on the following data on fixed versions.
Notes
[bookworm] - golang-github-labstack-echo <no-dsa> (Minor issue)
- golang-github-labstack-echo.v2 <not-affected> (Vulnerable code not present)
- golang-github-labstack-echo.v3 <not-affected> (Vulnerable code not present)
https://github.com/labstack/echo/commit/0ac4d74402391912ff6da733bb09fd4c3980b4e1 (v4.9.0)
https://github.com/labstack/echo/issues/2259