CVE-2020-36625
vulnerability analysis and mitigation

Overview

A vulnerability was identified in destiny.gg chat (versions <=0.0.0-20220628124252-0981d5add8f3) related to WebSocket upgrade CSRF. The vulnerability, tracked as CVE-2020-36625, was discovered in the websocket.Upgrader function within the main.go file (NVD, FortiGuard).

Technical details

The vulnerability stems from an improper implementation of the CheckOrigin function in the websocket.Upgrader configuration. The original implementation had the CheckOrigin function returning true by default, which bypassed the necessary origin validation checks for WebSocket upgrade requests. This implementation failed to properly validate request origins, potentially allowing cross-site request forgery attacks (GitHub PR).

Impact

The vulnerability could potentially allow attackers to perform cross-site request forgery (CSRF) attacks during WebSocket upgrade requests, as the origin validation was effectively disabled by the CheckOrigin function always returning true (GitHub PR).

Mitigation and workarounds

The vulnerability was fixed by removing the custom CheckOrigin implementation, allowing the system to fall back to the safe default behavior that only permits WebSocket upgrades when the host component of the Origin header matches the Host header (GitHub PR).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management