Security News > 2022 > August > New 'ParseThru' Parameter Smuggling Vulnerability Affects Golang-based Applications

New 'ParseThru' Parameter Smuggling Vulnerability Affects Golang-based Applications
2022-08-02 15:54

Security researchers have discovered a new vulnerability called ParseThru affecting Golang-based applications that could be abused to gain unauthorized access to cloud-based applications.

"The newly discovered vulnerability allows a threat actor to bypass validations under certain conditions, as a result of the use of unsafe URL parsing methods built in the language," Israeli cybersecurity firm Oxeye said in a report shared with The Hacker News.

The issue, at its core, has to do with inconsistencies stemming from changes introduced to Golang's URL parsing logic that's implemented in the "Net/url" library.

While versions of the programming language prior to 1.17 treated semicolons as a valid query delimiter, this behavior has since been modified to throw an error upon finding a query string containing a semicolon.

"Now, settings with non-percent-encoded semicolons are rejected and net/http servers will log a warning to 'Server.ErrorLog' when encountering one in a request URL.".

The problem arises when a Golang-based public API built upon a version greater than 1.17 communicates with an internal service running Golang before 1.17, leading to a scenario where a malicious actor could smuggle requests incorporating query parameters that would otherwise be rejected.


News URL

https://thehackernews.com/2022/08/new-parsethru-parameter-smuggling.html