CVE-2020-36567

NameCVE-2020-36567
DescriptionUnsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
golang-github-gin-gonic-gin (PTS)buster1.3.0+dfsg1-3vulnerable
bullseye1.6.3-3fixed
bookworm1.8.1-1fixed
sid, trixie1.8.1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
golang-github-gin-gonic-ginsource(unstable)1.6.3-1

Notes

[buster] - golang-github-gin-gonic-gin <postponed> (Limited support, minor issue)
https://github.com/gin-gonic/gin/pull/2237
https://github.com/gin-gonic/gin/commit/a71af9c144f9579f6dbe945341c1df37aaf09c0d (v1.6.0)

Search for package or bug name: Reporting problems