Lucene search

K
cvelistGoCVELIST:CVE-2023-29401
HistoryJun 08, 2023 - 8:27 p.m.

CVE-2023-29401 Improper handling of filenames in Content-Disposition HTTP header in github.com/gin-gonic/gin

2023-06-0820:27:15
Go
www.cve.org
1
cve-2023-29401
github.com/gin-gonic/gin
filenames
content-disposition
http header
context.fileattachment
sanitized
maliciously crafted
file name
untrusted source
attacker
served
modify

4.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

43.4%

The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of “setup.bat";x=.txt” will be sent as a file named “setup.bat”. If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.

CNA Affected

[
  {
    "vendor": "github.com/gin-gonic/gin",
    "product": "github.com/gin-gonic/gin",
    "collectionURL": "https://pkg.go.dev",
    "packageName": "github.com/gin-gonic/gin",
    "versions": [
      {
        "version": "1.3.1-0.20190301021747-ccb9e902956d",
        "lessThan": "1.9.1",
        "status": "affected",
        "versionType": "semver"
      }
    ],
    "programRoutines": [
      {
        "name": "Context.FileAttachment"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

4.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

43.4%