CVE-2014-8682 – gogs.io/gogs
Package
Manager: go
Name: gogs.io/gogs
Vulnerable Version: >=0.3.1 <0.5.8
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
EPSS: 0.64086 pctl0.98373
Details
SQL Injection in Gogs Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go.
Metadata
Created: 2021-06-29T18:32:48Z
Modified: 2021-05-20T16:59:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-g6xv-8q23-w2q3/GHSA-g6xv-8q23-w2q3.json
CWE IDs: ["CWE-89"]
Alternative ID: GHSA-g6xv-8q23-w2q3
Finding: F106
Auto approve: 1