First published: Wed Jan 20 2021(Updated: )
Gin-Gonic Gin Web Framework is vulnerable to HTTP response splitting attacks. A remote attacker could exploit this vulnerability to inject arbitrary HTTP headers and cause the server to return a split response, once the URL is clicked. This would allow the attacker to perform further attacks, such as Web cache poisoning or cross-site scripting, and possibly obtain sensitive information.
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Gin-Gonic Gin | <1.7.0 | |
go/github.com/gin-gonic/gin | <1.7.7 | 1.7.7 |
IBM Planning Analytics Local - IBM Planning Analytics Workspace | <=2.1 | |
IBM Planning Analytics Local - IBM Planning Analytics Workspace | <=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28483 is a vulnerability in package github.com/gin-gonic/gin that allows a client's IP to be spoofed by setting the X-Forwarded-For header.
CVE-2020-28483 affects all versions of package github.com/gin-gonic/gin under 1.7.7.
CVE-2020-28483 has a severity rating of 7.1 (high).
To fix CVE-2020-28483, upgrade package github.com/gin-gonic/gin to version 1.7.7 or later.
You can find more information about CVE-2020-28483 at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-28483), [GitHub Pull Request](https://github.com/gin-gonic/gin/pull/2632), [GitHub Commit](https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711).