greenhat616 / ncm-helper

Awesome netease cloud music helper
GNU General Public License v3.0
1 stars 0 forks source link

CVE-2023-29401 (Medium) detected in github.com/gin-gonic/gin-v1.7.0 #64

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2023-29401 - Medium Severity Vulnerability

Vulnerable Library - github.com/gin-gonic/gin-v1.7.0

Gin is a HTTP web framework written in Go (Golang). It features a Martini-like API with much better performance -- up to 40 times faster. If you need smashing performance, get yourself some Gin.

Library home page: https://proxy.golang.org/github.com/gin-gonic/gin/@v/v1.7.0.zip

Dependency Hierarchy: - :x: **github.com/gin-gonic/gin-v1.7.0** (Vulnerable Library)

Found in HEAD commit: 572e944608dce47ebc259ac7235004b1559e9001

Found in base branch: master

Vulnerability Details

In Gin Web Framework the filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of "setup.bat";x=.txt" will be sent as a file named "setup.bat". If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.

Publish Date: 2023-04-05

URL: CVE-2023-29401

CVSS 3 Score Details (5.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.


Step up your Open Source Security Game with Mend here