Vulnerabilities
CVE-2024-55947
UNKNOWNGogs is an open source self-hosted Git service. A malicious user is able to write a file to an arbitrary path on the server to gain SSH access to the server. The vulnerability is fixed in 0.13.1.
CVE-2024-54148
CRITICALGogs is an open source self-hosted Git service. A malicious user is able to commit and edit a crafted symlink file to a repository to gain SSH access to the server. The vulnerability is fixed in 0.13.1.
CVE-2022-1884
CRITICALA remote command execution vulnerability exists in gogs/gogs versions <=0.12.7 when deployed on a Windows server. The vulnerability arises due to improper validation of the `tree_path` parameter during file uploads. An attacker can set `tree_path=.git.` to upload a file into the .git directory, allowing them to write or rewrite the `.git/config` file. If the `core.sshCommand` is set, this can lead to remote command execution.
CVE-2024-44625
HIGHGogs <=0.13.0 is vulnerable to Directory Traversal via the editFilePost function of internal/route/repo/editor.go.
CVE-2024-39931
CRITICALGogs through 0.13.0 allows deletion of internal files.
CVE-2024-39930
CRITICALThe built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected.
CVE-2024-39932
CRITICALGogs through 0.13.0 allows argument injection during the previewing of changes.
CVE-2024-39933
HIGHGogs through 0.13.0 allows argument injection during the tagging of a new release.
CVE-2022-2024
CRITICALOS Command Injection in GitHub repository gogs/gogs prior to 0.12.11.
CVE-2022-32174
UNKNOWNIn Gogs, versions v0.6.5 through v0.12.10 are vulnerable to Stored Cross-Site Scripting (XSS) that leads to an account takeover.
CVE-2022-1986
CRITICALOS Command Injection in GitHub repository gogs/gogs prior to 0.12.9.
CVE-2022-31038
MEDIUMGogs is an open source self-hosted Git service. In versions of gogs prior to 0.12.9 `DisplayName` does not filter characters input from users, which leads to an XSS vulnerability when directly displayed in the issue list. This issue has been resolved in commit 155cae1d which sanitizes `DisplayName` prior to display to the user. All users of gogs are advised to upgrade. Users unable to upgrade should check their users' display names for malicious characters.
CVE-2022-1993
HIGHPath Traversal in GitHub repository gogs/gogs prior to 0.12.9.
CVE-2022-1992
CRITICALPath Traversal in GitHub repository gogs/gogs prior to 0.12.9.
CVE-2022-1285
HIGHServer-Side Request Forgery (SSRF) in GitHub repository gogs/gogs prior to 0.12.8.
CVE-2022-1464
HIGHStored xss bug in GitHub repository gogs/gogs prior to 0.12.7. As the repo is public , any user can view the report and when open the attachment then xss is executed. This bug allow executed any javascript code in victim account .
CVE-2022-0415
CRITICALRemote Command Execution in uploading repository file in GitHub repository gogs/gogs prior to 0.12.6.
CVE-2022-0870
MEDIUMServer-Side Request Forgery (SSRF) in GitHub repository gogs/gogs prior to 0.12.5.
CVE-2022-0871
HIGHMissing Authorization in GitHub repository gogs/gogs prior to 0.12.5.