Description

this is security vulnerability, can't say much about what tool we are using to check security issues in our repo. but the tool is showing some issues with HIGH status

security vulnerability Gin-Gonic Gin contains a reflected file download attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input. A remote attacker could leverage this to allow specially crafted files to be downloaded from a trusted domain.

How to reproduce

not sure

Expectations

vulnerability should resolve

Environment

  • go version: 1.20
  • gin version (or commit ref): 1.19
  • operating system: linux we use docker

Comment From: tharun-d

dup of https://github.com/gin-gonic/gin/issues/3555

Comment From: vitordm

any news about that?