HTTP Response Splitting Affecting github.com/gin-gonic/gin package, versions <1.7.7


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.21% (60th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMGINGONICGIN-1041736
  • published20 Jan 2021
  • disclosed19 Nov 2020
  • creditSoren L. Hansen

Introduced: 19 Nov 2020

CVE-2020-28483  (opens in a new tab)
CWE-113  (opens in a new tab)
First added by Snyk

How to fix?

Upgrade github.com/gin-gonic/gin to version 1.7.7 or higher.

Overview

github.com/gin-gonic/gin is a package that implements a HTTP web framework called gin.

Affected versions of this package are vulnerable to HTTP Response Splitting. When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header.

CVSS Scores

version 3.1