From 16a8c715703e577b30a2bc9955d34b4238549d7e Mon Sep 17 00:00:00 2001 From: Damien Neil Date: Tue, 3 Jan 2023 13:46:22 -0800 Subject: [PATCH] data/reports: add GHSA to GO-2020-0001.yaml Aliases: CVE-2020-36567, GHSA-6vm3-jj99-7229 Updates golang/vulndb#1 Fixes golang/vulndb#1209 Change-Id: I6d09a050d6a3d137de3dfff0b86e6320d226c0f6 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/460416 Run-TryBot: Damien Neil TryBot-Result: Gopher Robot Reviewed-by: Zvonimir Pavlinovic --- data/osv/GO-2020-0001.json | 3 ++- data/reports/GO-2020-0001.yaml | 2 ++ 2 files changed, 4 insertions(+), 1 deletion(-) diff --git a/data/osv/GO-2020-0001.json b/data/osv/GO-2020-0001.json index 8a9f5681..117eb7a5 100644 --- a/data/osv/GO-2020-0001.json +++ b/data/osv/GO-2020-0001.json @@ -3,7 +3,8 @@ "published": "2021-04-14T20:04:52Z", "modified": "0001-01-01T00:00:00Z", "aliases": [ - "CVE-2020-36567" + "CVE-2020-36567", + "GHSA-6vm3-jj99-7229" ], "details": "The default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path.", "affected": [ diff --git a/data/reports/GO-2020-0001.yaml b/data/reports/GO-2020-0001.yaml index c181eb80..b219683a 100644 --- a/data/reports/GO-2020-0001.yaml +++ b/data/reports/GO-2020-0001.yaml @@ -17,6 +17,8 @@ description: | which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path. published: 2021-04-14T20:04:52Z +ghsas: + - GHSA-6vm3-jj99-7229 credit: '@thinkerou ' references: - fix: https://github.com/gin-gonic/gin/pull/2237