cvelist/2023/29xxx/CVE-2023-29401.json
2023-06-08 21:00:40 +00:00

85 lines
3.2 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-29401",
"ASSIGNER": "security@golang.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of \"setup.bat";x=.txt\" will be sent as a file named \"setup.bat\". If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE 20: Improper Input Validation"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "github.com/gin-gonic/gin",
"product": {
"product_data": [
{
"product_name": "github.com/gin-gonic/gin",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1.3.1-0.20190301021747-ccb9e902956d",
"version_value": "1.9.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/gin-gonic/gin/issues/3555",
"refsource": "MISC",
"name": "https://github.com/gin-gonic/gin/issues/3555"
},
{
"url": "https://github.com/gin-gonic/gin/pull/3556",
"refsource": "MISC",
"name": "https://github.com/gin-gonic/gin/pull/3556"
},
{
"url": "https://github.com/gin-gonic/gin/releases/tag/v1.9.1",
"refsource": "MISC",
"name": "https://github.com/gin-gonic/gin/releases/tag/v1.9.1"
},
{
"url": "https://pkg.go.dev/vuln/GO-2023-1737",
"refsource": "MISC",
"name": "https://pkg.go.dev/vuln/GO-2023-1737"
}
]
},
"credits": [
{
"lang": "en",
"value": "motoyasu-saburi"
}
]
}