Skip to content

x/vulndb: potential Go vuln in gogs.io/gogs: GHSA-958j-443g-7mm7 #749

Closed
@julieqiu

Description

@julieqiu

In GitHub Security Advisory GHSA-958j-443g-7mm7, there is a vulnerability in the following Go packages or modules:

Unit Fixed Vulnerable Ranges
gogs.io/gogs 0.12.8 < 0.12.8

See doc/triage.md for instructions on how to triage this report.

packages:
  - package: gogs.io/gogs
    versions:
      - fixed: 0.12.8
description: |
    ### Impact

    The malicious user is able to upload a crafted `config` file into repository's `.git` directory with to gain SSH access to the server. All Windows installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are affected.

    ### Patches

    Repository file uploads are prohibited to its `.git` directory. Users should upgrade to 0.12.8 or the latest 0.13.0+dev.

    ### Workarounds

    [Disable repository files upload](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L128-L129).

    ### References

    https://www.huntr.dev/bounties/9cd4e7b7-0979-4e5e-9a1c-388b58dea76b/

    ### For more information

    If you have any questions or comments about this advisory, please post on #6968.
published: 2022-06-02T20:50:21Z
last_modified: 2022-06-02T20:50:23Z
cves:
  - CVE-2022-1884
ghsas:
  - GHSA-958j-443g-7mm7
links:
    context:
      - https://github.com/advisories/GHSA-958j-443g-7mm7

Metadata

Metadata

Assignees

Labels

excluded: NOT_IMPORTABLEThis vulnerability only exists in a binary and is not importable.

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions