We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Advisory GHSA-phm4-wf3h-pc3r references a vulnerability in the following Go modules:
Description: Gogs <=0.13.0 is vulnerable to Directory Traversal via the editFilePost function of internal/route/repo/editor.go.
References:
Cross references:
See doc/quickstart.md for instructions on how to triage this report.
id: GO-ID-PENDING modules: - module: gogs.io/gogs vulnerable_at: 0.13.0 summary: Unpatched Remote Code Execution in Gogs in gogs.io/gogs cves: - CVE-2024-44625 ghsas: - GHSA-phm4-wf3h-pc3r references: - advisory: https://github.com/advisories/GHSA-phm4-wf3h-pc3r - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-44625 - web: https://fysac.github.io/posts/2024/11/unpatched-remote-code-execution-in-gogs - web: https://gogs.io source: id: GHSA-phm4-wf3h-pc3r created: 2024-11-15T22:01:20.022370039Z review_status: UNREVIEWED
The text was updated successfully, but these errors were encountered:
Change https://go.dev/cl/629356 mentions this issue: data/reports: add 9 unreviewed reports
data/reports: add 9 unreviewed reports
Sorry, something went wrong.
6b4d4e2
tatianab
No branches or pull requests
Advisory GHSA-phm4-wf3h-pc3r references a vulnerability in the following Go modules:
Description:
Gogs <=0.13.0 is vulnerable to Directory Traversal via the editFilePost function of internal/route/repo/editor.go.
References:
Cross references:
See doc/quickstart.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: