Loading HuntDB...

GHSA-67mx-jc2f-jgjm

GitHub Security Advisory

OS Command Injection in file editor in Gogs

✓ GitHub Reviewed CRITICAL Has CVE

Advisory Details

### Impact

The malicious user is able to update a crafted `config` file into repository's `.git` directory in combination with crafted file deletion to gain SSH access to the server. All installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are affected.

### Patches

File deletions are prohibited to repository's `.git` directory. Users should upgrade to 0.12.9 or the latest 0.13.0+dev.

### Workarounds

N/A

### References

https://huntr.dev/bounties/776e8f29-ff5e-4501-bb9f-0bd335007930/

### For more information

If you have any questions or comments about this advisory, please post on #7000.

Affected Packages

Go gogs.io/gogs
Affected versions: 0 (fixed in 0.12.9)

Related CVEs

Key Information

GHSA ID
GHSA-67mx-jc2f-jgjm
Published
June 8, 2022 10:34 PM
Last Modified
June 17, 2022 7:21 PM
CVSS Score
9.0 /10
Primary Ecosystem
Go
Primary Package
gogs.io/gogs
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 15, 2025 6:32 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.