CVE-2020-36627

NameCVE-2020-36627
DescriptionA vulnerability was found in Macaron i18n. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file i18n.go. The manipulation leads to open redirect. The attack can be launched remotely. Upgrading to version 0.5.0 is able to address this issue. The name of the patch is 329b0c4844cc16a5a253c011b55180598e707735. It is recommended to upgrade the affected component. The identifier VDB-216745 was assigned to this vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
golang-github-go-macaron-i18n (PTS)buster0.0~git20160612.0.ef57533-6vulnerable
bullseye0.0~git20160612.0.ef57533-7vulnerable
bookworm, sid0.0~git20160612.0.ef57533-8.1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
golang-github-go-macaron-i18nsource(unstable)(unfixed)

Notes

[buster] - golang-github-go-macaron-i18n <postponed> (Limited support, minor issue, follow bullseye DSAs/point-releases)
https://github.com/go-macaron/i18n/commit/329b0c4844cc16a5a253c011b55180598e707735 (v0.5.0)

Search for package or bug name: Reporting problems