You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.
Note: Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.
See doc/triage.md for instructions on how to triage this report.
modules:
- module: github.com/gin-gonic/gin
packages:
- package: github.com/gin-gonic/gin
description: "Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable
to Improper Input Validation by allowing an attacker to use a specially crafted
request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.\r\r**Note:**
Although this issue does not pose a significant threat on its own it can serve
as an input vector for other more impactful vulnerabilities. However, successful
exploitation may depend on the server configuration and whether the header is
used in the application logic.\n"
cves:
- CVE-2023-26125
references:
- web: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285
- fix: https://github.com/t0rchwo0d/gin/commit/fd9f98e70fb4107ee68c783482d231d35e60507b
- fix: https://github.com/gin-gonic/gin/pull/3500
- fix: https://github.com/gin-gonic/gin/pull/3503
- web: https://github.com/gin-gonic/gin/releases/tag/v1.9.0
The text was updated successfully, but these errors were encountered:
The NIST page says "This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary." So not filing a report now.
I'm not seeing the vulnerability here. The report says that this can lead to cache poisoning, but I don't see the path to that outcome. Perhaps I'm missing something.
My inclination is to mark this NOT_A_VULNERABILITY.
CVE-2023-26125 references github.com/gin-gonic/gin, which may be a Go module.
Description:
Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.
Note: Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.
References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: