Lucene search

K
githubGitHub Advisory DatabaseGHSA-2C4M-59X9-FR2G
HistoryMay 12, 2023 - 8:19 p.m.

Gin Web Framework does not properly sanitize filename parameter of Context.FileAttachment function

2023-05-1220:19:25
CWE-494
GitHub Advisory Database
github.com
47
gin web framework
fileattachment function
unsanitized filename
content-disposition header
header modification
security issue

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

46.6%

The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of “setup.bat";x=.txt” will be sent as a file named “setup.bat”.

If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.

Affected configurations

Vulners
Node
gin-gonicginRange1.3.1-0.20190301021747-ccb9e902956d1.9.1
VendorProductVersionCPE
gin-gonicgin*cpe:2.3:a:gin-gonic:gin:*:*:*:*:*:*:*:*

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

EPSS

0.001

Percentile

46.6%