File tree 1 file changed +20
-2
lines changed
1 file changed +20
-2
lines changed Original file line number Diff line number Diff line change 1
1
modules :
2
2
- module : github.com/gin-gonic/gin
3
3
versions :
4
- - fixed : 1.6.3-0.20210406033725-bfc8ca285eb4
4
+ - fixed : 1.7.7
5
+ vulnerable_at : 1.7.6
5
6
packages :
6
7
- package : github.com/gin-gonic/gin
7
8
symbols :
8
9
- Context.ClientIP
10
+ - Context.RemoteIP
11
+ derived_symbols :
12
+ - Context.Next
13
+ - Engine.HandleContext
14
+ - Engine.Run
15
+ - Engine.RunFd
16
+ - Engine.RunListener
17
+ - Engine.RunTLS
18
+ - Engine.RunUnix
19
+ - Engine.ServeHTTP
9
20
description : |
10
21
Due to improper HTTP header santization, a malicious user can spoof their
11
22
source IP address by setting the X-Forwarded-For header. This may allow
15
26
- CVE-2020-28483
16
27
ghsas :
17
28
- GHSA-h395-qcrw-5vmq
18
- credit : ' @sorenh '
29
+ credit : ' @sorenisanerd '
19
30
references :
31
+ - report : https://github.com/gin-gonic/gin/issues/2862
32
+ - report : https://github.com/gin-gonic/gin/issues/2473
33
+ - report : https://github.com/gin-gonic/gin/issues/2232
34
+ - fix : https://github.com/gin-gonic/gin/pull/2844
35
+ - fix : https://github.com/gin-gonic/gin/commit/5929d521715610c9dd14898ebbe1d188d5de8937
20
36
- fix : https://github.com/gin-gonic/gin/pull/2632
21
37
- fix : https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711
38
+ - fix : https://github.com/gin-gonic/gin/pull/2675
39
+ - fix : https://github.com/gin-gonic/gin/commit/03e5e05ae089bc989f1ca41841f05504d29e3fd9
22
40
- web : https://github.com/gin-gonic/gin/pull/2474
You can’t perform that action at this time.
0 commit comments