First published: Sun Dec 25 2022(Updated: )
A vulnerability was found in Macaron i18n. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file i18n.go. The manipulation leads to open redirect. The attack can be launched remotely. Upgrading to version 0.5.0 can address this issue. The name of the patch is 329b0c4844cc16a5a253c011b55180598e707735. It is recommended to upgrade the affected component. The identifier VDB-216745 was assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/go-macaron/i18n | <0.5.0 | 0.5.0 |
go-macaron | <0.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-36627 is medium with a severity value of 6.1.
The CVE-2020-36627 vulnerability can be exploited by manipulating the file i18n.go to perform an open redirect attack remotely.
Go-macaron I18n versions up to 0.5.0 are affected by CVE-2020-36627.
Upgrading to version 0.5.0 of Go-macaron I18n will address the CVE-2020-36627 vulnerability.
You can find more information about CVE-2020-36627 at the following references: [Link 1](https://github.com/go-macaron/i18n/commit/329b0c4844cc16a5a253c011b55180598e707735), [Link 2](https://github.com/go-macaron/i18n/releases/tag/v0.5.0), [Link 3](https://vuldb.com/?id.216745).