Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-26125
HistoryMay 04, 2023 - 12:00 a.m.

CVE-2023-26125

2023-05-0400:00:00
ubuntu.com
ubuntu.com
92
versions
gin-gonic/gin
improper input validation
x-forwarded-prefix header
cache poisoning
impactful vulnerabilities
server configuration
application logic

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

0.001 Low

EPSS

Percentile

38.6%

Versions of the package github.com/gin-gonic/gin before 1.9.0 are
vulnerable to Improper Input Validation by allowing an attacker to use a
specially crafted request via the X-Forwarded-Prefix header, potentially
leading to cache poisoning. Note: Although this issue does not pose a
significant threat on its own it can serve as an input vector for other
more impactful vulnerabilities. However, successful exploitation may depend
on the server configuration and whether the header is used in the
application logic.

Bugs

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

0.001 Low

EPSS

Percentile

38.6%