CVE-2024-39933 – gogs.io/gogs
Package
Manager: go
Name: gogs.io/gogs
Vulnerable Version: >=0 <0.13.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AC:L/AV:N/A:N/C:H/I:N/PR:L/S:C/UI:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
EPSS: 0.00189 pctl0.40978
Details
Gogs allows argument Injection when tagging new releases ### Impact Unprivileged user accounts with at least one SSH key can read arbitrary files on the system. For instance, they could leak the configuration files that could contain database credentials (`[database] *`) and `[security] SECRET_KEY`. Attackers could also exfiltrate TLS certificates, other users' repositories, and the Gogs database when the SQLite driver is enabled. ### Patches Unintended Git options has been ignored for creating tags (https://github.com/gogs/gogs/pull/7872). Users should upgrade to 0.13.1 or the latest 0.14.0+dev. ### Workarounds No viable workaround available, please only grant access to trusted users to your Gogs instance on affected versions. ### References https://www.cve.org/CVERecord?id=CVE-2024-39933
Metadata
Created: 2024-12-23T20:38:12Z
Modified: 2024-12-23T20:38:12Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-m27m-h5gj-wwmg/GHSA-m27m-h5gj-wwmg.json
CWE IDs: ["CWE-88"]
Alternative ID: GHSA-m27m-h5gj-wwmg
Finding: F014
Auto approve: 1