From 41efc6e629e9ef9733f56f0ade848dc6d7c11c3a Mon Sep 17 00:00:00 2001 From: Chris Lu Date: Thu, 30 Sep 2021 21:23:05 -0700 Subject: [PATCH] Update go.mod CVE-2020-28483 high severity Vulnerable versions: < 1.7.0 Patched version: 1.7.0 This affects all versions of package github.com/gin-gonic/gin under 1.7.0. When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header. --- go.mod | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/go.mod b/go.mod index c3992eefb..df2d17f21 100644 --- a/go.mod +++ b/go.mod @@ -170,7 +170,7 @@ require ( github.com/d4l3k/messagediff v1.2.1 // indirect github.com/dgryski/go-farm v0.0.0-20190423205320-6a90982ecee2 // indirect github.com/gin-contrib/sse v0.1.0 // indirect - github.com/gin-gonic/gin v1.6.0 // indirect + github.com/gin-gonic/gin v1.7.0 // indirect github.com/go-playground/locales v0.13.0 // indirect github.com/go-playground/universal-translator v0.17.0 // indirect github.com/go-playground/validator/v10 v10.2.0 // indirect