Bug 1927270 (CVE-2020-28483) - CVE-2020-28483 gin: HTTP response splitting
Summary: CVE-2020-28483 gin: HTTP response splitting
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2020-28483
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1927273
TreeView+ depends on / blocked
 
Reported: 2021-02-10 12:41 UTC by Dhananjay Arunesh
Modified: 2021-09-28 18:33 UTC (History)
7 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2021-02-17 13:01:53 UTC
Embargoed:


Attachments (Terms of Use)

Description Dhananjay Arunesh 2021-02-10 12:41:13 UTC
This affects all versions of package github.com/gin-gonic/gin. When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header.

Comment 1 Borja Tarraso 2021-02-11 10:17:00 UTC
External References:

https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-1041736

Comment 3 Product Security DevOps Team 2021-02-17 13:01:53 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-28483

Comment 4 Product Security DevOps Team 2021-02-17 19:01:54 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-28483

Comment 5 Product Security DevOps Team 2021-02-18 01:01:54 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-28483

Comment 6 Product Security DevOps Team 2021-02-18 07:01:56 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-28483

Comment 7 Product Security DevOps Team 2021-02-18 13:01:56 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-28483


Note You need to log in before you can comment on or make changes to this bug.