Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1445 | The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of "setup.bat";x=.txt" will be sent as a file named "setup.bat". If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header. |
Github GHSA |
GHSA-2c4m-59x9-fr2g | Gin Web Framework does not properly sanitize filename parameter of Context.FileAttachment function |
Mon, 06 Jan 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2025-01-06T19:30:14.833Z
Reserved: 2023-04-05T19:36:35.042Z
Link: CVE-2023-29401
Updated: 2024-08-02T14:07:45.567Z
Status : Modified
Published: 2023-06-08T21:15:16.620
Modified: 2025-01-06T20:15:25.613
Link: CVE-2023-29401
OpenCVE Enrichment
No data.
EUVD
Github GHSA