Loading HuntDB...

Vulnerabilities

CVE-2024-55947

UNKNOWN

Gogs is an open source self-hosted Git service. A malicious user is able to write a file to an arbitrary path on the server to gain SSH access to the server. The vulnerability is fixed in 0.13.1.

Published Dec 23, 2024

CVE-2024-54148

CRITICAL

Gogs is an open source self-hosted Git service. A malicious user is able to commit and edit a crafted symlink file to a repository to gain SSH access to the server. The vulnerability is fixed in 0.13.1.

Published Dec 23, 2024

CVE-2022-1884

CRITICAL

A remote command execution vulnerability exists in gogs/gogs versions <=0.12.7 when deployed on a Windows server. The vulnerability arises due to improper validation of the `tree_path` parameter during file uploads. An attacker can set `tree_path=.git.` to upload a file into the .git directory, allowing them to write or rewrite the `.git/config` file. If the `core.sshCommand` is set, this can lead to remote command execution.

Published Nov 15, 2024

CVE-2024-44625

HIGH

Gogs <=0.13.0 is vulnerable to Directory Traversal via the editFilePost function of internal/route/repo/editor.go.

Published Nov 15, 2024

CVE-2024-39931

CRITICAL

Gogs through 0.13.0 allows deletion of internal files.

Published Jul 04, 2024

CVE-2024-39930

CRITICAL

The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected.

Published Jul 04, 2024

CVE-2024-39932

CRITICAL

Gogs through 0.13.0 allows argument injection during the previewing of changes.

Published Jul 04, 2024

CVE-2024-39933

HIGH

Gogs through 0.13.0 allows argument injection during the tagging of a new release.

Published Jul 04, 2024

CVE-2022-2024

CRITICAL

OS Command Injection in GitHub repository gogs/gogs prior to 0.12.11.

Published Feb 25, 2023

CVE-2022-32174

UNKNOWN

In Gogs, versions v0.6.5 through v0.12.10 are vulnerable to Stored Cross-Site Scripting (XSS) that leads to an account takeover.

Published Oct 11, 2022

CVE-2022-1986

CRITICAL

OS Command Injection in GitHub repository gogs/gogs prior to 0.12.9.

Published Jun 09, 2022

CVE-2022-31038

MEDIUM

Gogs is an open source self-hosted Git service. In versions of gogs prior to 0.12.9 `DisplayName` does not filter characters input from users, which leads to an XSS vulnerability when directly displayed in the issue list. This issue has been resolved in commit 155cae1d which sanitizes `DisplayName` prior to display to the user. All users of gogs are advised to upgrade. Users unable to upgrade should check their users' display names for malicious characters.

Published Jun 08, 2022

CVE-2022-1993

HIGH

Path Traversal in GitHub repository gogs/gogs prior to 0.12.9.

Published Jun 08, 2022

CVE-2022-1992

CRITICAL

Path Traversal in GitHub repository gogs/gogs prior to 0.12.9.

Published Jun 08, 2022

CVE-2022-1285

HIGH

Server-Side Request Forgery (SSRF) in GitHub repository gogs/gogs prior to 0.12.8.

Published Jun 01, 2022

CVE-2022-1464

HIGH

Stored xss bug in GitHub repository gogs/gogs prior to 0.12.7. As the repo is public , any user can view the report and when open the attachment then xss is executed. This bug allow executed any javascript code in victim account .

Published May 05, 2022

CVE-2022-0415

CRITICAL

Remote Command Execution in uploading repository file in GitHub repository gogs/gogs prior to 0.12.6.

Published Mar 21, 2022

CVE-2022-0870

MEDIUM

Server-Side Request Forgery (SSRF) in GitHub repository gogs/gogs prior to 0.12.5.

Published Mar 11, 2022

CVE-2022-0871

HIGH

Missing Authorization in GitHub repository gogs/gogs prior to 0.12.5.

Published Mar 11, 2022