First published: Fri May 12 2023(Updated: )
Gin-Gonic Gin Web Framework could allow a remote attacker to bypass security restrictions, caused by improper input validation by the filename parameter of the Context.FileAttachment function. By using a specially-crafted attachment file name, an attacker could exploit this vulnerability to modify the Content-Disposition header.
Credit: security@golang.org security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gin-Gonic Gin | >=1.3.1-0.20190301021747-ccb9e902956d<1.9.1 | |
go/github.com/gin-gonic/gin | >=1.3.1-0.20190301021747-ccb9e902956d<1.9.1 | 1.9.1 |
redhat/golang-github-gin-gonic-gin | <1.9.1 | 1.9.1 |
IBM Planning Analytics Local - IBM Planning Analytics Workspace | <=2.1 | |
IBM Planning Analytics Local - IBM Planning Analytics Workspace | <=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29401 is a vulnerability in the Gin-Gonic Gin web framework that could allow a remote attacker to bypass security restrictions.
The vulnerability occurs due to the filename parameter of the Context.FileAttachment function not being properly sanitized, allowing a maliciously crafted filename to modify the Content-Disposition header.
The severity of CVE-2023-29401 is high with a CVSS score of 7.5.
The affected software versions include Gin-Gonic Gin versions between 1.3.1 and 1.9.1, golang-github-gin-gonic-gin version 1.9.1, and github.com/gin-gonic/gin versions between 1.3.1 and 1.9.1.
To fix CVE-2023-29401, update the Gin-Gonic Gin web framework to version 1.9.1 or higher.