GHSA-67mx-jc2f-jgjm
GitHub Security Advisory
OS Command Injection in file editor in Gogs
Advisory Details
### Impact
The malicious user is able to update a crafted `config` file into repository's `.git` directory in combination with crafted file deletion to gain SSH access to the server. All installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are affected.
### Patches
File deletions are prohibited to repository's `.git` directory. Users should upgrade to 0.12.9 or the latest 0.13.0+dev.
### Workarounds
N/A
### References
https://huntr.dev/bounties/776e8f29-ff5e-4501-bb9f-0bd335007930/
### For more information
If you have any questions or comments about this advisory, please post on #7000.
Affected Packages
Related CVEs
Key Information
Dataset
Data from GitHub Advisory Database. This information is provided for research and educational purposes.