You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
See doc/triage.md for instructions on how to triage this report.
modules:
- module: github.com/gin-gonic/gin
versions:
- introduced: TODO (earliest fixed "", vuln range ">= 1.3.1-0.20190301021747-ccb9e902956d,
<= 1.9.0")
packages:
- package: github.com/gin-gonic/gin
summary: Gin Web Framework does not properly sanitize filename parameter of Context.FileAttachment
function
description: |-
The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of "setup.bat";x=.txt" will be sent as a file named "setup.bat".
If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.
cves:
- CVE-2023-29401
ghsas:
- GHSA-2c4m-59x9-fr2g
references:
- report: https://github.com/gin-gonic/gin/issues/3555
- fix: https://github.com/gin-gonic/gin/pull/3556
- web: https://pkg.go.dev/vuln/GO-2023-1737
- advisory: https://github.com/advisories/GHSA-2c4m-59x9-fr2g
The text was updated successfully, but these errors were encountered:
In GitHub Security Advisory GHSA-2c4m-59x9-fr2g, there is a vulnerability in the following Go packages or modules:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: