This affects all versions of package github.com/gin-gonic/gin. When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header.
{ "binaries": [ { "binary_version": "1.2+dfsg1-2ubuntu1", "binary_name": "golang-github-gin-gonic-gin-dev" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-28483.json"
{ "binaries": [ { "binary_version": "1.3.0+dfsg1-3", "binary_name": "golang-github-gin-gonic-gin-dev" } ] }
{ "binaries": [ { "binary_version": "1.6.3-4", "binary_name": "golang-github-gin-gonic-gin-dev" } ] }
{ "binaries": [ { "binary_version": "1.8.1-2", "binary_name": "golang-github-gin-gonic-gin-dev" } ] }
{ "binaries": [ { "binary_version": "1.8.1-3", "binary_name": "golang-github-gin-gonic-gin-dev" } ] }