Skip to content

CORS `Access-Control-Allow-Origin` settings are too lenient

Moderate
sebastian-wire published GHSA-v7xx-cx8m-g66p Sep 30, 2021

Package

wire-server

Affected versions

< 2.106.0

Patched versions

None

Description

Impact

The CORS Access-Control-Allow-Origin header set by nginz is set for all subdomains of .wire.com (including wire.com). This means that if somebody were to find an XSS vector in any of our subdomains, they could use it to talk to the Wire API using the user's Cookie. To make sure that a compromise of say xyz.wire.com does not yield access to the cookie of prod-nginz-https.wire.com we should only limit the Access-Control-Allow-Origin header to apps that actually require the cookie.

As far as I know those are: account-pages, team-settings and the webapp

Patches

Has the problem been patched? What versions should users upgrade to?

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

References

Are there any links users can visit to find out more?

For more information

If you have any questions or comments about this advisory:

Severity

Moderate

CVE ID

CVE-2021-41101

Weaknesses

No CWEs

Credits