CVE-2022-1285 – gogs.io/gogs
Package
Manager: go
Name: gogs.io/gogs
Vulnerable Version: >=0 <0.12.8
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
EPSS: 0.00942 pctl0.75365
Details
Server-Side Request Forgery in gogs webhook ### Impact The malicious user is able to discover services in the internal network through webhook functionality. All installations accepting public traffic are affected. ### Patches Webhook payload URLs are revalidated before each delivery to make sure they are not resolved to blocked local network addresses. Users should upgrade to 0.12.8 or the latest 0.13.0+dev. ### Workarounds Run Gogs in its own private network. ### References https://huntr.dev/bounties/da1fbd6e-7a02-458e-9c2e-6d226c47046d/ ### For more information If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/issues/6901.
Metadata
Created: 2022-06-03T15:35:32Z
Modified: 2022-06-03T15:35:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-w689-557m-2cvq/GHSA-w689-557m-2cvq.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-w689-557m-2cvq
Finding: F100
Auto approve: 1