data/reports: add GHSA to GO-2020-0001.yaml
Aliases: CVE-2020-36567, GHSA-6vm3-jj99-7229
Updates golang/vulndb#1
Fixes golang/vulndb#1209
Change-Id: I6d09a050d6a3d137de3dfff0b86e6320d226c0f6
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/460416
Run-TryBot: Damien Neil <dneil@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Zvonimir Pavlinovic <zpavlinovic@google.com>
diff --git a/data/osv/GO-2020-0001.json b/data/osv/GO-2020-0001.json
index 8a9f568..117eb7a 100644
--- a/data/osv/GO-2020-0001.json
+++ b/data/osv/GO-2020-0001.json
@@ -3,7 +3,8 @@
"published": "2021-04-14T20:04:52Z",
"modified": "0001-01-01T00:00:00Z",
"aliases": [
- "CVE-2020-36567"
+ "CVE-2020-36567",
+ "GHSA-6vm3-jj99-7229"
],
"details": "The default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path.",
"affected": [
diff --git a/data/reports/GO-2020-0001.yaml b/data/reports/GO-2020-0001.yaml
index c181eb8..b219683 100644
--- a/data/reports/GO-2020-0001.yaml
+++ b/data/reports/GO-2020-0001.yaml
@@ -17,6 +17,8 @@
which is included in the Default engine, allows attackers to inject arbitrary
log entries by manipulating the request path.
published: 2021-04-14T20:04:52Z
+ghsas:
+ - GHSA-6vm3-jj99-7229
credit: '@thinkerou <thinkerou@gmail.com>'
references:
- fix: https://github.com/gin-gonic/gin/pull/2237