Lucene search

K
githubGitHub Advisory DatabaseGHSA-6VM3-JJ99-7229
HistoryDec 27, 2022 - 9:30 p.m.

Gin's default logger allows unsanitized input that can allow remote attackers to inject arbitrary log lines

2022-12-2721:30:20
CWE-116
CWE-117
GitHub Advisory Database
github.com
17
gin
http web framework
go
golang
unsanitized input
remote attackers
arbitrary log lines
github
v1.6.0
software

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.002

Percentile

54.9%

Gin is a HTTP web framework written in Go (Golang). Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines.

Affected configurations

Vulners
Node
gin-gonicginRange<1.6.0
VendorProductVersionCPE
gin-gonicgin*cpe:2.3:a:gin-gonic:gin:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

EPSS

0.002

Percentile

54.9%