Skip to content

Commit 564a77a

Browse files
committed
data/reports: add GO-2023-1737.yaml
Aliases: CVE-2023-29401 Updates #1737 Change-Id: Iaf02c0a5966e96a2515b0c31b8739bc4a80131ce Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/494315 Reviewed-by: Tatiana Bradley <[email protected]> Reviewed-by: Damien Neil <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Run-TryBot: Zvonimir Pavlinovic <[email protected]>
1 parent 00566bd commit 564a77a

File tree

3 files changed

+154
-0
lines changed

3 files changed

+154
-0
lines changed

data/cve/v5/GO-2023-1737.json

Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
{
2+
"dataType": "CVE_RECORD",
3+
"dataVersion": "5.0",
4+
"cveMetadata": {
5+
"cveId": "CVE-2023-29401"
6+
},
7+
"containers": {
8+
"cna": {
9+
"providerMetadata": {
10+
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc"
11+
},
12+
"descriptions": [
13+
{
14+
"lang": "en",
15+
"value": "The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of \"setup.bat\u0026quot;;x=.txt\" will be sent as a file named \"setup.bat\". If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header."
16+
}
17+
],
18+
"affected": [
19+
{
20+
"vendor": "github.com/gin-gonic/gin",
21+
"product": "github.com/gin-gonic/gin",
22+
"collectionURL": "https://pkg.go.dev",
23+
"packageName": "github.com/gin-gonic/gin",
24+
"versions": [
25+
{
26+
"version": "1.3.1-0.20190301021747-ccb9e902956d",
27+
"lessThan": "",
28+
"status": "affected",
29+
"versionType": "semver"
30+
}
31+
],
32+
"programRoutines": [
33+
{
34+
"name": "Context.FileAttachment"
35+
}
36+
],
37+
"defaultStatus": "unaffected"
38+
}
39+
],
40+
"problemTypes": [
41+
{
42+
"descriptions": [
43+
{
44+
"lang": "en",
45+
"description": "CWE 20: Improper Input Validation"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://github.com/gin-gonic/gin/issues/3555"
53+
},
54+
{
55+
"url": "https://github.com/gin-gonic/gin/pull/3556"
56+
},
57+
{
58+
"url": "https://pkg.go.dev/vuln/GO-2023-1737"
59+
}
60+
],
61+
"credits": [
62+
{
63+
"lang": "en",
64+
"value": "motoyasu-saburi"
65+
}
66+
]
67+
}
68+
}
69+
}

data/osv/GO-2023-1737.json

Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2023-1737",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2023-29401"
8+
],
9+
"details": "The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of \"setup.bat\u0026quot;;x=.txt\" will be sent as a file named \"setup.bat\".\n\nIf the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.",
10+
"affected": [
11+
{
12+
"package": {
13+
"name": "github.com/gin-gonic/gin",
14+
"ecosystem": "Go"
15+
},
16+
"ranges": [
17+
{
18+
"type": "SEMVER",
19+
"events": [
20+
{
21+
"introduced": "1.3.1-0.20190301021747-ccb9e902956d"
22+
}
23+
]
24+
}
25+
],
26+
"ecosystem_specific": {
27+
"imports": [
28+
{
29+
"path": "github.com/gin-gonic/gin",
30+
"symbols": [
31+
"Context.FileAttachment"
32+
]
33+
}
34+
]
35+
}
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "REPORT",
41+
"url": "https://github.com/gin-gonic/gin/issues/3555"
42+
},
43+
{
44+
"type": "FIX",
45+
"url": "https://github.com/gin-gonic/gin/pull/3556"
46+
}
47+
],
48+
"credits": [
49+
{
50+
"name": "motoyasu-saburi"
51+
}
52+
],
53+
"database_specific": {
54+
"url": "https://pkg.go.dev/vuln/GO-2023-1737"
55+
}
56+
}

data/reports/GO-2023-1737.yaml

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
modules:
2+
- module: github.com/gin-gonic/gin
3+
versions:
4+
- introduced: 1.3.1-0.20190301021747-ccb9e902956d
5+
vulnerable_at: 1.9.0
6+
packages:
7+
- package: github.com/gin-gonic/gin
8+
symbols:
9+
- Context.FileAttachment
10+
summary: Improper handling of file names in Content-Disposition HTTP header
11+
description: |
12+
The filename parameter of the Context.FileAttachment function is
13+
not properly sanitized. A maliciously crafted filename can cause
14+
the Content-Disposition header to be sent with an unexpected
15+
filename value or otherwise modify the Content-Disposition header.
16+
For example, a filename of "setup.bat&quot;;x=.txt" will be sent
17+
as a file named "setup.bat".
18+
19+
If the FileAttachment function is called with names provided by an
20+
untrusted source, this may permit an attacker to cause a file to
21+
be served with a name different than provided. Maliciously crafted
22+
attachment file name can modify the Content-Disposition header.
23+
credit: motoyasu-saburi
24+
references:
25+
- report: https://github.com/gin-gonic/gin/issues/3555
26+
- fix: https://github.com/gin-gonic/gin/pull/3556
27+
cve_metadata:
28+
id: CVE-2023-29401
29+
cwe: 'CWE 20: Improper Input Validation'

0 commit comments

Comments
 (0)