{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-29401","assignerOrgId":"1bb62c36-49e3-4200-9d77-64a1400537cc","state":"PUBLISHED","assignerShortName":"Go","dateReserved":"2023-04-05T19:36:35.042Z","datePublished":"2023-06-08T20:27:15.057Z","dateUpdated":"2025-01-06T19:30:14.833Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bb62c36-49e3-4200-9d77-64a1400537cc","shortName":"Go","dateUpdated":"2023-06-12T19:14:11.166Z"},"title":"Improper handling of filenames in Content-Disposition HTTP header in github.com/gin-gonic/gin","descriptions":[{"lang":"en","value":"The filename parameter of the Context.FileAttachment function is not properly sanitized. A maliciously crafted filename can cause the Content-Disposition header to be sent with an unexpected filename value or otherwise modify the Content-Disposition header. For example, a filename of \"setup.bat&quot;;x=.txt\" will be sent as a file named \"setup.bat\". If the FileAttachment function is called with names provided by an untrusted source, this may permit an attacker to cause a file to be served with a name different than provided. Maliciously crafted attachment file name can modify the Content-Disposition header."}],"affected":[{"vendor":"github.com/gin-gonic/gin","product":"github.com/gin-gonic/gin","collectionURL":"https://pkg.go.dev","packageName":"github.com/gin-gonic/gin","versions":[{"version":"1.3.1-0.20190301021747-ccb9e902956d","lessThan":"1.9.1","status":"affected","versionType":"semver"}],"programRoutines":[{"name":"Context.FileAttachment"}],"defaultStatus":"unaffected"}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE 20: Improper Input Validation"}]}],"references":[{"url":"https://github.com/gin-gonic/gin/issues/3555"},{"url":"https://github.com/gin-gonic/gin/pull/3556"},{"url":"https://github.com/gin-gonic/gin/releases/tag/v1.9.1"},{"url":"https://pkg.go.dev/vuln/GO-2023-1737"}],"credits":[{"lang":"en","value":"motoyasu-saburi"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T14:07:45.567Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/gin-gonic/gin/issues/3555","tags":["x_transferred"]},{"url":"https://github.com/gin-gonic/gin/pull/3556","tags":["x_transferred"]},{"url":"https://github.com/gin-gonic/gin/releases/tag/v1.9.1","tags":["x_transferred"]},{"url":"https://pkg.go.dev/vuln/GO-2023-1737","tags":["x_transferred"]}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":4.3,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","integrityImpact":"LOW","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-01-06T19:29:16.540610Z","id":"CVE-2023-29401","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-06T19:30:14.833Z"}}]}}