Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-26125

Опубликовано: 04 мая 2023
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning. Note: Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.

A flaw was found in Gin-Gonic Gin. This flaw allows a remote attacker to bypass security restrictions caused by improper input validation. An attacker can perform cache poisoning attacks by sending a specially-crafted request using the X-Forwarded-Prefix header.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Custom Metric Autoscaler operator for Red Hat Openshiftcustom-metrics-autoscaler/custom-metrics-autoscaler-rhel8Not affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-loki-rhel8Not affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/loki-rhel8-operatorNot affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/lokistack-gateway-rhel9Not affected
Migration Toolkit for Applications 6mta/mta-admin-addon-rhel8Will not fix
Migration Toolkit for Applications 6mta/mta-windup-addon-rhel9Affected
Migration Toolkit for Virtualizationmigration-toolkit-virtualization/mtv-rhel8-operatorAffected
OpenShift Serverlessopenshift-serverless-1/client-kn-rhel8Affected
OpenShift Serverlessopenshift-serverless-1/ingress-rhel8-operatorAffected
Red Hat Advanced Cluster Management for Kubernetes 2acm-multicluster-globalhub-agent-containerAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2203769golang-github-gin-gonic-gin: Improper Input Validation

EPSS

Процентиль: 46%
0.00232
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 5.6
ubuntu
почти 3 года назад

Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning. **Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.

CVSS3: 5.6
nvd
почти 3 года назад

Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning. **Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.

CVSS3: 5.6
debian
почти 3 года назад

Versions of the package github.com/gin-gonic/gin before 1.9.0 are vuln ...

CVSS3: 5.6
github
почти 3 года назад

Improper input validation in github.com/gin-gonic/gin

EPSS

Процентиль: 46%
0.00232
Низкий

7.3 High

CVSS3