GO-2020-0029

Source
https://pkg.go.dev/vuln/GO-2020-0029
Import Source
https://vuln.go.dev/ID/GO-2020-0029.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2020-0029
Withdrawn
2024-05-15T05:37:11.011697Z
Published
2021-04-14T20:04:52Z
Modified
2022-08-29T16:50:59Z
Summary
[none]
Details

Due to improper HTTP header santization, a malicious user can spoof their source IP address by setting the X-Forwarded-For header. This may allow a user to bypass IP based restrictions, or obfuscate their true source.

References

Affected packages

Go / github.com/gin-gonic/gin

Package

Name
github.com/gin-gonic/gin
View open source insights on deps.dev
Purl
pkg:golang/github.com/gin-gonic/gin

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.0.0-20141229113116-0099840c98ae

Ecosystem specific

{
    "imports": [
        {
            "path": "github.com/gin-gonic/gin",
            "symbols": [
                "Context.ClientIP"
            ]
        }
    ]
}

Database specific

{
    "url": "https://pkg.go.dev/vuln/GO-2020-0029"
}