Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-958j-443g-7mm7

Опубликовано: 02 июн. 2022
Источник: github
Github: Прошло ревью
CVSS3: 10

Описание

OS Command Injection in gogs

Impact

The malicious user is able to upload a crafted config file into repository's .git directory with to gain SSH access to the server. All Windows installations with repository upload enabled (default) are affected.

Patches

Repository file uploads are prohibited to its .git directory. Users should upgrade to 0.12.8 or the latest 0.13.0+dev.

Workarounds

Disable repository files upload.

References

https://www.huntr.dev/bounties/9cd4e7b7-0979-4e5e-9a1c-388b58dea76b/

For more information

If you have any questions or comments about this advisory, please post on #6968.

Пакеты

Наименование

gogs.io/gogs

go
Затронутые версииВерсия исправления

< 0.12.8

0.12.8

EPSS

Процентиль: 93%
0.09822
Низкий

10 Critical

CVSS3

Дефекты

CWE-77
CWE-78

Связанные уязвимости

CVSS3: 9.8
nvd
около 1 года назад

A remote command execution vulnerability exists in gogs/gogs versions <=0.12.7 when deployed on a Windows server. The vulnerability arises due to improper validation of the `tree_path` parameter during file uploads. An attacker can set `tree_path=.git.` to upload a file into the .git directory, allowing them to write or rewrite the `.git/config` file. If the `core.sshCommand` is set, this can lead to remote command execution.

EPSS

Процентиль: 93%
0.09822
Низкий

10 Critical

CVSS3

Дефекты

CWE-77
CWE-78