-
Notifications
You must be signed in to change notification settings - Fork 64
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Aliases: CVE-2023-29401 Updates #1737 Change-Id: Iaf02c0a5966e96a2515b0c31b8739bc4a80131ce Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/494315 Reviewed-by: Tatiana Bradley <[email protected]> Reviewed-by: Damien Neil <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Run-TryBot: Zvonimir Pavlinovic <[email protected]>
- Loading branch information
1 parent
00566bd
commit 564a77a
Showing
3 changed files
with
154 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,69 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.0", | ||
"cveMetadata": { | ||
"cveId": "CVE-2023-29401" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"providerMetadata": { | ||
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc" | ||
}, | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of \"setup.bat\u0026quot;;x=.txt\" will be sent as a file named \"setup.bat\". If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header." | ||
} | ||
], | ||
"affected": [ | ||
{ | ||
"vendor": "github.com/gin-gonic/gin", | ||
"product": "github.com/gin-gonic/gin", | ||
"collectionURL": "https://pkg.go.dev", | ||
"packageName": "github.com/gin-gonic/gin", | ||
"versions": [ | ||
{ | ||
"version": "1.3.1-0.20190301021747-ccb9e902956d", | ||
"lessThan": "", | ||
"status": "affected", | ||
"versionType": "semver" | ||
} | ||
], | ||
"programRoutines": [ | ||
{ | ||
"name": "Context.FileAttachment" | ||
} | ||
], | ||
"defaultStatus": "unaffected" | ||
} | ||
], | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"description": "CWE 20: Improper Input Validation" | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"url": "https://github.com/gin-gonic/gin/issues/3555" | ||
}, | ||
{ | ||
"url": "https://github.com/gin-gonic/gin/pull/3556" | ||
}, | ||
{ | ||
"url": "https://pkg.go.dev/vuln/GO-2023-1737" | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"lang": "en", | ||
"value": "motoyasu-saburi" | ||
} | ||
] | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,56 @@ | ||
{ | ||
"schema_version": "1.3.1", | ||
"id": "GO-2023-1737", | ||
"modified": "0001-01-01T00:00:00Z", | ||
"published": "0001-01-01T00:00:00Z", | ||
"aliases": [ | ||
"CVE-2023-29401" | ||
], | ||
"details": "The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of \"setup.bat\u0026quot;;x=.txt\" will be sent as a file named \"setup.bat\".\n\nIf the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.", | ||
"affected": [ | ||
{ | ||
"package": { | ||
"name": "github.com/gin-gonic/gin", | ||
"ecosystem": "Go" | ||
}, | ||
"ranges": [ | ||
{ | ||
"type": "SEMVER", | ||
"events": [ | ||
{ | ||
"introduced": "1.3.1-0.20190301021747-ccb9e902956d" | ||
} | ||
] | ||
} | ||
], | ||
"ecosystem_specific": { | ||
"imports": [ | ||
{ | ||
"path": "github.com/gin-gonic/gin", | ||
"symbols": [ | ||
"Context.FileAttachment" | ||
] | ||
} | ||
] | ||
} | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"type": "REPORT", | ||
"url": "https://github.com/gin-gonic/gin/issues/3555" | ||
}, | ||
{ | ||
"type": "FIX", | ||
"url": "https://github.com/gin-gonic/gin/pull/3556" | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"name": "motoyasu-saburi" | ||
} | ||
], | ||
"database_specific": { | ||
"url": "https://pkg.go.dev/vuln/GO-2023-1737" | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
modules: | ||
- module: github.com/gin-gonic/gin | ||
versions: | ||
- introduced: 1.3.1-0.20190301021747-ccb9e902956d | ||
vulnerable_at: 1.9.0 | ||
packages: | ||
- package: github.com/gin-gonic/gin | ||
symbols: | ||
- Context.FileAttachment | ||
summary: Improper handling of file names in Content-Disposition HTTP header | ||
description: | | ||
The filename parameter of the Context.FileAttachment function is | ||
not properly sanitized. A maliciously crafted filename can cause | ||
the Content-Disposition header to be sent with an unexpected | ||
filename value or otherwise modify the Content-Disposition header. | ||
For example, a filename of "setup.bat";x=.txt" will be sent | ||
as a file named "setup.bat". | ||
If the FileAttachment function is called with names provided by an | ||
untrusted source, this may permit an attacker to cause a file to | ||
be served with a name different than provided. Maliciously crafted | ||
attachment file name can modify the Content-Disposition header. | ||
credit: motoyasu-saburi | ||
references: | ||
- report: https://github.com/gin-gonic/gin/issues/3555 | ||
- fix: https://github.com/gin-gonic/gin/pull/3556 | ||
cve_metadata: | ||
id: CVE-2023-29401 | ||
cwe: 'CWE 20: Improper Input Validation' |