CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
Gogs is an open source self-hosted Git service. A malicious user is able to write a file to an arbitrary path on the server to gain SSH access to the server. The vulnerability is fixed in 0.13.1. | 8.7 |
High |
||
Gogs is an open source self-hosted Git service. A malicious user is able to commit and edit a crafted symlink file to a repository to gain SSH access to the server. The vulnerability is fixed in 0.13.1. | 8.7 |
High |
||
Gogs <=0.13.0 is vulnerable to Directory Traversal via the editFilePost function of internal/route/repo/editor.go. | 8.8 |
High |
||
The built-in SSH server of Gogs through 0.13.0 allows argument injection in internal/ssh/ssh.go, leading to remote code execution. Authenticated attackers can exploit this by opening an SSH connection and sending a malicious --split-string env request if the built-in SSH server is activated. Windows installations are unaffected. | 9.9 |
Critical |
||
Gogs through 0.13.0 allows deletion of internal files. | 9.9 |
Critical |
||
Gogs through 0.13.0 allows argument injection during the previewing of changes. | 9.9 |
Critical |
||
Gogs through 0.13.0 allows argument injection during the tagging of a new release. | 7.7 |
High |