CVE-2024-39932 – gogs.io/gogs
Package
Manager: go
Name: gogs.io/gogs
Vulnerable Version: >=0 <0.13.1
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:L/S:C/UI:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.02434 pctl0.84582
Details
Gogs allows argument injection during the previewing of changes ### Impact Unprivileged user accounts can write to arbitrary files on the filesystem. We could demonstrate its exploitation to force a re-installation of the instance, granting administrator rights. It allows accessing and altering any user's code hosted on the same instance. ### Patches Unintended Git options has been ignored for diff preview (https://github.com/gogs/gogs/pull/7871). Users should upgrade to 0.13.1 or the latest 0.14.0+dev. ### Workarounds No viable workaround available, please only grant access to trusted users to your Gogs instance on affected versions. ### References https://www.cve.org/CVERecord?id=CVE-2024-39932
Metadata
Created: 2024-12-23T20:38:27Z
Modified: 2024-12-23T20:38:27Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-9pp6-wq8c-3w2c/GHSA-9pp6-wq8c-3w2c.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-9pp6-wq8c-3w2c
Finding: F422
Auto approve: 1