blob: e99ba4a70e21cca1e53a90595ae1c262d476bc4b [file] [log] [blame]
id: GO-2021-0052
modules:
- module: github.com/gin-gonic/gin
versions:
- fixed: 1.7.7
vulnerable_at: 1.7.6
packages:
- package: github.com/gin-gonic/gin
symbols:
- Context.ClientIP
- Context.RemoteIP
derived_symbols:
- Context.Next
- Engine.HandleContext
- Engine.Run
- Engine.RunFd
- Engine.RunListener
- Engine.RunTLS
- Engine.RunUnix
- Engine.ServeHTTP
summary: Inconsistent interpretation of HTTP Requests in github.com/gin-gonic/gin
description: |-
Due to improper HTTP header sanitization, a malicious user can spoof their
source IP address by setting the X-Forwarded-For header. This may allow a user
to bypass IP based restrictions, or obfuscate their true source.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2020-28483
ghsas:
- GHSA-h395-qcrw-5vmq
credits:
- '@sorenisanerd'
references:
- report: https://github.com/gin-gonic/gin/issues/2862
- report: https://github.com/gin-gonic/gin/issues/2473
- report: https://github.com/gin-gonic/gin/issues/2232
- fix: https://github.com/gin-gonic/gin/pull/2844
- fix: https://github.com/gin-gonic/gin/commit/5929d521715610c9dd14898ebbe1d188d5de8937
- fix: https://github.com/gin-gonic/gin/pull/2632
- fix: https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711
- fix: https://github.com/gin-gonic/gin/pull/2675
- fix: https://github.com/gin-gonic/gin/commit/03e5e05ae089bc989f1ca41841f05504d29e3fd9
- web: https://github.com/gin-gonic/gin/pull/2474