abdelsfane / deployadactyl

Other
1 stars 0 forks source link

CVE-2023-29401 (Medium) detected in github.com/gin-gonic/GIN-v1.3.0 #10

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2023-29401 - Medium Severity Vulnerability

Vulnerable Library - github.com/gin-gonic/GIN-v1.3.0

Gin is a HTTP web framework written in Go (Golang). It features a Martini-like API with much better performance -- up to 40 times faster. If you need smashing performance, get yourself some Gin.

Library home page: https://proxy.golang.org/github.com/gin-gonic/!g!i!n/@v/v1.3.0.zip

Dependency Hierarchy: - :x: **github.com/gin-gonic/GIN-v1.3.0** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of "setup.bat";x=.txt" will be sent as a file named "setup.bat". If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.

Publish Date: 2023-06-08

URL: CVE-2023-29401

CVSS 3 Score Details (4.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None

For more information on CVSS3 Scores, click here.


Step up your Open Source Security Game with Mend here