Affected by GO-2024-2578
and 7 other vulnerabilities
GO-2024-2578: Apache Answer Cross-site Scripting vulnerability in github.com/apache/incubator-answer
GO-2024-2579: Apache Answer Unrestricted Upload of File with Dangerous Type vulnerability in github.com/apache/incubator-answer
GO-2024-2580: Apache Answer Race Condition vulnerability in github.com/apache/incubator-answer
GO-2024-2743: XSS vulnerability via personal website in github.com/apache/incubator-answer
GO-2024-3064: Apache Answer: The link to reset the user's password will remain valid after sending a new link in github.com/apache/incubator-answer
GO-2024-3065: Apache Answer: The link for resetting user password is not Single-Use in github.com/apache/incubator-answer
GO-2024-3158: Apache Answer: Avatar URL leaked user email addresses in github.com/apache/incubator-answer
GO-2024-3287: Apache Answer: Predictable Authorization Token Using UUIDv1 in github.com/apache/incubator-answer
package
Version:
v1.2.1
Opens a new window with list of versions in this module.
Published: Dec 14, 2023
License: Apache-2.0
Opens a new window with license information.
Imports: 21
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
¶
ProviderSetServer is providers.
func NewHTTPServer(debug bool,
staticRouter *router.StaticRouter,
answerRouter *router.AnswerAPIRouter,
swaggerRouter *router.SwaggerRouter,
viewRouter *router.UIRouter,
authUserMiddleware *middleware.AuthUserMiddleware,
avatarMiddleware *middleware.AvatarMiddleware,
shortIDMiddleware *middleware.ShortIDMiddleware,
templateRouter *router.TemplateRouter,
pluginAPIRouter *router.PluginAPIRouter,
) *gin.Engine
NewHTTPServer new http server.
type HTTP struct {
Addr string `json:"addr" mapstructure:"addr"`
}
HTTP http config
Source Files
¶
Click to show internal directories.
Click to hide internal directories.