Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

x/vulndb: potential Go vuln in gogs.io/gogs: GHSA-phm4-wf3h-pc3r #3275

Closed
GoVulnBot opened this issue Nov 15, 2024 · 1 comment
Closed

x/vulndb: potential Go vuln in gogs.io/gogs: GHSA-phm4-wf3h-pc3r #3275

GoVulnBot opened this issue Nov 15, 2024 · 1 comment
Assignees
Labels

Comments

@GoVulnBot
Copy link

Advisory GHSA-phm4-wf3h-pc3r references a vulnerability in the following Go modules:

Module
gogs.io/gogs

Description:
Gogs <=0.13.0 is vulnerable to Directory Traversal via the editFilePost function of internal/route/repo/editor.go.

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: gogs.io/gogs
      vulnerable_at: 0.13.0
summary: Unpatched Remote Code Execution in Gogs in gogs.io/gogs
cves:
    - CVE-2024-44625
ghsas:
    - GHSA-phm4-wf3h-pc3r
references:
    - advisory: https://github.com/advisories/GHSA-phm4-wf3h-pc3r
    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-44625
    - web: https://fysac.github.io/posts/2024/11/unpatched-remote-code-execution-in-gogs
    - web: https://gogs.io
source:
    id: GHSA-phm4-wf3h-pc3r
    created: 2024-11-15T22:01:20.022370039Z
review_status: UNREVIEWED

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/629356 mentions this issue: data/reports: add 9 unreviewed reports

@tatianab tatianab self-assigned this Nov 19, 2024
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants