logo

CVE-2024-39931 gogs.io/gogs

Package

Manager: go
Name: gogs.io/gogs
Vulnerable Version: >=0 <0.13.1

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:L/S:C/UI:N

CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.07233 pctl0.9125

Details

Gogs allows deletion of internal files ### Impact Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by `RUN_USER` in the configuration. It allows attackers to access and alter any users' code hosted on the same instance. ### Patches Deletion of `.git` files has been prohibited (https://github.com/gogs/gogs/pull/7870). Users should upgrade to 0.13.1 or the latest 0.14.0+dev. ### Workarounds No viable workaround available, please only grant access to trusted users to your Gogs instance on affected versions. ### References https://www.cve.org/CVERecord?id=CVE-2024-39931

Metadata

Created: 2024-12-23T20:38:20Z
Modified: 2024-12-23T20:38:20Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-ccqv-43vm-4f3w/GHSA-ccqv-43vm-4f3w.json
CWE IDs: ["CWE-552"]
Alternative ID: GHSA-ccqv-43vm-4f3w
Finding: F123
Auto approve: 1