Skip to content

Commit

Permalink
data/reports: add GO-2023-1737.yaml
Browse files Browse the repository at this point in the history
Aliases: CVE-2023-29401

Updates #1737

Change-Id: Iaf02c0a5966e96a2515b0c31b8739bc4a80131ce
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/494315
Reviewed-by: Tatiana Bradley <[email protected]>
Reviewed-by: Damien Neil <[email protected]>
TryBot-Result: Gopher Robot <[email protected]>
Run-TryBot: Zvonimir Pavlinovic <[email protected]>
  • Loading branch information
zpavlinovic committed May 11, 2023
1 parent 00566bd commit 564a77a
Show file tree
Hide file tree
Showing 3 changed files with 154 additions and 0 deletions.
69 changes: 69 additions & 0 deletions data/cve/v5/GO-2023-1737.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,69 @@
{
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"cveMetadata": {
"cveId": "CVE-2023-29401"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
},
"descriptions": [
{
"lang": "en",
"value": "The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of \"setup.bat\u0026quot;;x=.txt\" will be sent as a file named \"setup.bat\". If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header."
}
],
"affected": [
{
"vendor": "github.com/gin-gonic/gin",
"product": "github.com/gin-gonic/gin",
"collectionURL": "https://pkg.go.dev",
"packageName": "github.com/gin-gonic/gin",
"versions": [
{
"version": "1.3.1-0.20190301021747-ccb9e902956d",
"lessThan": "",
"status": "affected",
"versionType": "semver"
}
],
"programRoutines": [
{
"name": "Context.FileAttachment"
}
],
"defaultStatus": "unaffected"
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE 20: Improper Input Validation"
}
]
}
],
"references": [
{
"url": "https://github.com/gin-gonic/gin/issues/3555"
},
{
"url": "https://github.com/gin-gonic/gin/pull/3556"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1737"
}
],
"credits": [
{
"lang": "en",
"value": "motoyasu-saburi"
}
]
}
}
}
56 changes: 56 additions & 0 deletions data/osv/GO-2023-1737.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
{
"schema_version": "1.3.1",
"id": "GO-2023-1737",
"modified": "0001-01-01T00:00:00Z",
"published": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2023-29401"
],
"details": "The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of \"setup.bat\u0026quot;;x=.txt\" will be sent as a file named \"setup.bat\".\n\nIf the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.",
"affected": [
{
"package": {
"name": "github.com/gin-gonic/gin",
"ecosystem": "Go"
},
"ranges": [
{
"type": "SEMVER",
"events": [
{
"introduced": "1.3.1-0.20190301021747-ccb9e902956d"
}
]
}
],
"ecosystem_specific": {
"imports": [
{
"path": "github.com/gin-gonic/gin",
"symbols": [
"Context.FileAttachment"
]
}
]
}
}
],
"references": [
{
"type": "REPORT",
"url": "https://github.com/gin-gonic/gin/issues/3555"
},
{
"type": "FIX",
"url": "https://github.com/gin-gonic/gin/pull/3556"
}
],
"credits": [
{
"name": "motoyasu-saburi"
}
],
"database_specific": {
"url": "https://pkg.go.dev/vuln/GO-2023-1737"
}
}
29 changes: 29 additions & 0 deletions data/reports/GO-2023-1737.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
modules:
- module: github.com/gin-gonic/gin
versions:
- introduced: 1.3.1-0.20190301021747-ccb9e902956d
vulnerable_at: 1.9.0
packages:
- package: github.com/gin-gonic/gin
symbols:
- Context.FileAttachment
summary: Improper handling of file names in Content-Disposition HTTP header
description: |
The filename parameter of the Context.FileAttachment function is
not properly sanitized. A maliciously crafted filename can cause
the Content-Disposition header to be sent with an unexpected
filename value or otherwise modify the Content-Disposition header.
For example, a filename of "setup.bat&quot;;x=.txt" will be sent
as a file named "setup.bat".
If the FileAttachment function is called with names provided by an
untrusted source, this may permit an attacker to cause a file to
be served with a name different than provided. Maliciously crafted
attachment file name can modify the Content-Disposition header.
credit: motoyasu-saburi
references:
- report: https://github.com/gin-gonic/gin/issues/3555
- fix: https://github.com/gin-gonic/gin/pull/3556
cve_metadata:
id: CVE-2023-29401
cwe: 'CWE 20: Improper Input Validation'

0 comments on commit 564a77a

Please sign in to comment.