Skip to content

Commit 16a8c71

Browse files
committed
data/reports: add GHSA to GO-2020-0001.yaml
Aliases: CVE-2020-36567, GHSA-6vm3-jj99-7229 Updates #1 Fixes #1209 Change-Id: I6d09a050d6a3d137de3dfff0b86e6320d226c0f6 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/460416 Run-TryBot: Damien Neil <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Reviewed-by: Zvonimir Pavlinovic <[email protected]>
1 parent aeec1a2 commit 16a8c71

File tree

2 files changed

+4
-1
lines changed

2 files changed

+4
-1
lines changed

data/osv/GO-2020-0001.json

+2-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,8 @@
33
"published": "2021-04-14T20:04:52Z",
44
"modified": "0001-01-01T00:00:00Z",
55
"aliases": [
6-
"CVE-2020-36567"
6+
"CVE-2020-36567",
7+
"GHSA-6vm3-jj99-7229"
78
],
89
"details": "The default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path.",
910
"affected": [

data/reports/GO-2020-0001.yaml

+2
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,8 @@ description: |
1717
which is included in the Default engine, allows attackers to inject arbitrary
1818
log entries by manipulating the request path.
1919
published: 2021-04-14T20:04:52Z
20+
ghsas:
21+
- GHSA-6vm3-jj99-7229
2022
credit: '@thinkerou <[email protected]>'
2123
references:
2224
- fix: https://github.com/gin-gonic/gin/pull/2237

0 commit comments

Comments
 (0)