Unsanitized input in the default logger in github.com/gin-gonic/gin before v1.6.0 allows remote attackers to inject arbitrary log lines.
The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.
Link | Tags |
---|---|
https://github.com/gin-gonic/gin/pull/2237 | exploit third party advisory patch |
https://github.com/gin-gonic/gin/commit/a71af9c144f9579f6dbe945341c1df37aaf09c0d | third party advisory patch |
https://pkg.go.dev/vuln/GO-2020-0001 | patch vendor advisory |