logo

CVE-2022-0870 gogs.io/gogs

Package

Manager: go
Name: gogs.io/gogs
Vulnerable Version: >=0 <0.12.5

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N

EPSS: 0.05466 pctl0.89814

Details

SSRF in repository migration Gogs is a self-hosted Git service. The malicious user is able to discover services in the internal network through repository migration functionality. All installations accepting public traffic are affected. Internal network CIDRs are prohibited to be used as repository migration targets. Users should upgrade to 0.12.5 or the latest 0.13.0+dev. Gogs should be ran in its own private network until users can update.

Metadata

Created: 2022-03-12T00:00:34Z
Modified: 2022-03-24T23:23:21Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-7v5r-r995-q2x2/GHSA-7v5r-r995-q2x2.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-7v5r-r995-q2x2
Finding: F100
Auto approve: 1