-
Notifications
You must be signed in to change notification settings - Fork 8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
High severity security vulnerability #3608
Comments
Silence is the new answer, thx @appleboy and all the other maintainers |
Any update when they are planning to fix this issue ?? |
I have received no updates |
please see #3556 |
v1.9.1 have released, please see https://github.com/gin-gonic/gin/releases/tag/v1.9.1, thanks! |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
CVE-2023-29401
Severity: HIGH
CVSS Score: 7.5
In Gin Web Framework the filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of "setup.bat";x=.txt" will be sent as a file named "setup.bat". If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.
The text was updated successfully, but these errors were encountered: