data/reports: add GHSA to GO-2020-0001.yaml

Aliases: CVE-2020-36567, GHSA-6vm3-jj99-7229

Updates golang/vulndb#1
Fixes golang/vulndb#1209

Change-Id: I6d09a050d6a3d137de3dfff0b86e6320d226c0f6
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/460416
Run-TryBot: Damien Neil <dneil@google.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Reviewed-by: Zvonimir Pavlinovic <zpavlinovic@google.com>
diff --git a/data/osv/GO-2020-0001.json b/data/osv/GO-2020-0001.json
index 8a9f568..117eb7a 100644
--- a/data/osv/GO-2020-0001.json
+++ b/data/osv/GO-2020-0001.json
@@ -3,7 +3,8 @@
   "published": "2021-04-14T20:04:52Z",
   "modified": "0001-01-01T00:00:00Z",
   "aliases": [
-    "CVE-2020-36567"
+    "CVE-2020-36567",
+    "GHSA-6vm3-jj99-7229"
   ],
   "details": "The default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path.",
   "affected": [
diff --git a/data/reports/GO-2020-0001.yaml b/data/reports/GO-2020-0001.yaml
index c181eb8..b219683 100644
--- a/data/reports/GO-2020-0001.yaml
+++ b/data/reports/GO-2020-0001.yaml
@@ -17,6 +17,8 @@
     which is included in the Default engine, allows attackers to inject arbitrary
     log entries by manipulating the request path.
 published: 2021-04-14T20:04:52Z
+ghsas:
+  - GHSA-6vm3-jj99-7229
 credit: '@thinkerou <thinkerou@gmail.com>'
 references:
   - fix: https://github.com/gin-gonic/gin/pull/2237