Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-36567

Опубликовано: 27 дек. 2022
Источник: debian

Описание

Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-github-gin-gonic-ginfixed1.6.3-1package
golang-github-gin-gonic-ginpostponedbusterpackage

Примечания

  • https://github.com/gin-gonic/gin/pull/2237

  • https://github.com/gin-gonic/gin/commit/a71af9c144f9579f6dbe945341c1df37aaf09c0d (v1.6.0)

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 3 лет назад

Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines.

CVSS3: 7.5
redhat
около 3 лет назад

Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines.

CVSS3: 7.5
nvd
около 3 лет назад

Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines.

CVSS3: 7.5
github
около 3 лет назад

Gin's default logger allows unsanitized input that can allow remote attackers to inject arbitrary log lines