HomeGofiberCVE-2020-15111

CVE-2020-15111

MEDIUM
4.2CVSS
Published: 2020-07-20
Updated: 2024-11-21
AI Analysis

Description

In Fiber before version 1.12.6, the filename that is given in c.Attachment() (https://docs.gofiber.io/ctx#attachment) is not escaped, and therefore vulnerable for a CRLF injection attack. I.e. an attacker could upload a custom filename and then give the link to the victim. With this filename, the attacker can change the name of the downloaded file, redirect to another site, change the authorization header, etc. A possible workaround is to serialize the input before passing it to ctx.Attachment().

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
Attack Vector
network
Complexity
high
Privileges
none
User Action
required
Scope
unchanged
Confidentiality
low
Integrity
low
Availability
none
Weaknesses
CWE-74CWE-93CWE-74

Metadata

Primary Vendor
GOFIBER
Published
7/20/2020
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

gofiber : fiber

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2020-15111 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com