Skip to content

Commit

Permalink
data/reports: add GHSA to GO-2020-0001.yaml
Browse files Browse the repository at this point in the history
Aliases: CVE-2020-36567, GHSA-6vm3-jj99-7229

Updates #1
Fixes #1209

Change-Id: I6d09a050d6a3d137de3dfff0b86e6320d226c0f6
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/460416
Run-TryBot: Damien Neil <[email protected]>
TryBot-Result: Gopher Robot <[email protected]>
Reviewed-by: Zvonimir Pavlinovic <[email protected]>
  • Loading branch information
neild committed Jan 3, 2023
1 parent aeec1a2 commit 16a8c71
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 1 deletion.
3 changes: 2 additions & 1 deletion data/osv/GO-2020-0001.json
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,8 @@
"published": "2021-04-14T20:04:52Z",
"modified": "0001-01-01T00:00:00Z",
"aliases": [
"CVE-2020-36567"
"CVE-2020-36567",
"GHSA-6vm3-jj99-7229"
],
"details": "The default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path.",
"affected": [
Expand Down
2 changes: 2 additions & 0 deletions data/reports/GO-2020-0001.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,8 @@ description: |
which is included in the Default engine, allows attackers to inject arbitrary
log entries by manipulating the request path.
published: 2021-04-14T20:04:52Z
ghsas:
- GHSA-6vm3-jj99-7229
credit: '@thinkerou <[email protected]>'
references:
- fix: https://github.com/gin-gonic/gin/pull/2237
Expand Down

0 comments on commit 16a8c71

Please sign in to comment.