| Titel | kitsada8621 Digital-Library-Management-System 1.0 Improper Output Neutralization for Logs |
|---|
| Beschreibung | header := ctx.GetHeader("Authorization")
if header == "" {
ctx.JSON(http.StatusUnauthorized, models.ResponseJson{
Success: false,
Message: "authorization is required",
})
ctx.Abort()
return
}
parts := strings.Split(header, " ")
fmt.Println(parts)
In line 28 of the middleware/jwt_refresh_token_middleware.go file, the program uses fmt.Println(parts) to print the split header (the value obtained from the Authorization header). This is a potential security risk because if the value is controlled by the user (which appears to be the case based on the code snippet provided), an attacker may attempt to inject malicious content in the header to perform a log injection attack. Using unverified or uncleaned user input during logging may lead to security issues such as sensitive information disclosure and tampering of log files. This situation is one of the common forms of log injection vulnerability. Therefore, you should not output unprocessed user input directly into the log file. |
|---|
| Quelle | ⚠️ https://github.com/kitsada8621/Digital-Library-Management-System/issues/1 |
|---|
| Benutzer | zihe (UID 56943) |
|---|
| Einreichung | 20.08.2024 12:34 (vor 2 Jahren) |
|---|
| Moderieren | 29.08.2024 08:01 (9 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 276072 [kitsada8621 Digital Library Management System 1.0 jwt_refresh_token_middleware.go JwtRefreshAuth Authorization erweiterte Rechte] |
|---|
| Punkte | 20 |
|---|