Serilog Client IP Spoofing vulnerability
Moderate severity
GitHub Reviewed
Published
Aug 29, 2024
to the GitHub Advisory Database
•
Updated Sep 4, 2024
Description
Published by the National Vulnerability Database
Aug 29, 2024
Published to the GitHub Advisory Database
Aug 29, 2024
Reviewed
Aug 29, 2024
Last updated
Sep 4, 2024
Serilog (before v2.1.0) contains a Client IP Spoofing vulnerability, which allows attackers to falsify their IP addresses in log files by specifying an arbitrary IP as a value of X-Forwarded-For or Client-Ip headers while performing HTTP requests.
It is not possible to configure Serilog.Enrichers.ClientInfo to not trust the X-Forwarded-For header.
References