Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

High severity security vulnerability #3608

Closed
aman98 opened this issue May 19, 2023 · 5 comments
Closed

High severity security vulnerability #3608

aman98 opened this issue May 19, 2023 · 5 comments

Comments

@aman98
Copy link

aman98 commented May 19, 2023

CVE-2023-29401

Severity: HIGH
CVSS Score: 7.5

In Gin Web Framework the filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of "setup.bat";x=.txt" will be sent as a file named "setup.bat". If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.

@jnelle
Copy link

jnelle commented May 20, 2023

Silence is the new answer, thx @appleboy and all the other maintainers

@ss893
Copy link

ss893 commented May 24, 2023

Any update when they are planning to fix this issue ??

@amandalal
Copy link

I have received no updates

@thinkerou
Copy link
Member

please see #3556

@thinkerou
Copy link
Member

v1.9.1 have released, please see https://github.com/gin-gonic/gin/releases/tag/v1.9.1, thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants