First published: Tue Dec 27 2022(Updated: )
A flaw was found in gin. This issue occurs when the default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path.
Credit: security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gin-Gonic Gin | <1.6.0 | |
redhat/gin | <1.6.0 | 1.6.0 |
IBM Planning Analytics Local - IBM Planning Analytics Workspace | <=2.1 | |
IBM Planning Analytics Local - IBM Planning Analytics Workspace | <=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-36567 is a vulnerability in github.com/gin-gonic/gin before v1.6.0 that allows remote attackers to inject arbitrary log entries by manipulating the request path.
CVE-2020-36567 has a severity rating of 7.5 (High).
CVE-2020-36567 affects the gin-gonic/gin package before version 1.6.0.
To fix CVE-2020-36567, update the gin-gonic/gin package to version 1.6.0 or later.
You can find more information about CVE-2020-36567 in the following references: [CVE](https://www.cve.org/CVERecord?id=CVE-2020-36567), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-36567), [GitHub Commit](https://github.com/gin-gonic/gin/commit/a71af9c144f9579f6dbe945341c1df37aaf09c0d), [GitHub Pull Request](https://github.com/gin-gonic/gin/pull/2237), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=2156683), [Red Hat Errata](https://access.redhat.com/errata/RHSA-2023:0934), [GO-2020-0001](https://pkg.go.dev/vuln/GO-2020-0001).