Gin Web Framework does not properly sanitize filename parameter of Context.FileAttachment function
Moderate severity
GitHub Reviewed
Published
May 12, 2023
to the GitHub Advisory Database
•
Updated Nov 5, 2023
Package
Affected versions
>= 1.3.1-0.20190301021747-ccb9e902956d, < 1.9.1
Patched versions
1.9.1
Description
Published to the GitHub Advisory Database
May 12, 2023
Reviewed
May 12, 2023
Published by the National Vulnerability Database
Jun 8, 2023
Last updated
Nov 5, 2023
The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of "setup.bat";x=.txt" will be sent as a file named "setup.bat".
If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header.
References